A Discussion Board Post Exploring the NIST Framework

There are many benefits organizations can receive using the NIST Framework. An important benefit is that the framework is technologically neutral, meaning that it can be utilized by several types of technologies and businesses. The Framework can also be used to achieve multiple goals, whether it is monitoring cybersecurity attacks, or used as a guide…

A Discussion Board Post Exploring the Role of a CISO

As a Chief Information Security Officer of a publicly traded company, I would take several steps to ensure the availability of the company’s systems. First, I would present the board of directors and investors with a presentation that drives home the importance of adequately funding an IT team, as well as the importance of dedicating…

The Human Factor in Cybersecurity

Name: Lindsey Lorton Date: March 19, 2024 The Human Factor in Cybersecurity Balancing the need for training and extra cybersecurity measures in the workplace. The importance of workplace cybersecurity and training             With the increasing spread of cybercrime, it is important that organizations invest in both employee training and cybersecurity measures. Since bad actors can…

Critical Infrastructure and SCADA Systems

Name: Lindsey Lorton Date: March 12, 2024 Critical Infrastructure and SCADA Systems The role of supervisory control and data acquisition (SCADA) in industrial control systems (ICS) and in mitigating vulnerabilities in critical infrastructure systems. The use of SCADA in industrial control systems and its components SCADA is a system used in controlling critical infrastructure systems….

The CIA Triad Write-Up

Name: Lindsey LortonDate: January 25, 2024 Exploring the CIA TriadThe CIA triad describes the three core ideas of cybersecurity: Confidentiality, Integrity, and Availability. Breaking Down the Triad While the CIA Triad’s concepts typically function interconnectedly, it is important to understand how each works independently. Confidentiality deals with protecting and securing sensitive information, including the use…