In-Class Exercise: Creating Cybersecurity Policies

Remote Access Policy for Halo ApparelEffective Date: 2/12/25BLUF (Bottom Line Up Front):All remote access to Halo Apparel’s systems must use MFA and a company VPN. Only approved users with necessary access can connect; all devices must meet security standards. Sensitive data must be encrypted, and incidents must be reported immediately. Non-compliance will result in access…

SCADA Systems: Vulnerabilities in Critical Infrastructure

BLUF:In the following article about SCADA systems, we are introduced to what its role is in relation to Critical infrastructure systems, which are identified by the U.S government as areas or Infrastructures that require protection from threats, due to the fact that these areas provide “goods and services that have great contribution to the econonmy”…

The CIA Triad

ConfidentialityConfidentiality is what the first letter in the CIA triad stands for. The goal of having this is to prevent potentially compromising information from being seen by unauthorized eyes. The higher the damage that can be done if said information is discovered determines the amount of security given. Staff training and data encryption are good…