Dive into the essential backbone of cybersecurity. This paper breaks down the CIA Triad (Confidentiality, Integrity, Availability) and pairs it with the operational power of the AAA Framework (Authentication, Authorization, Accounting). Learn how these twin concepts form the non-negotiable foundation for securing any modern digital asset.
Category: CIA Triad
The Role and Necessity of the NIST Cybersecurity Framework
The NIST CSF is the gold standard for risk management. My paper breaks down the core Identify, Protect, Detect, Respond, Recover functions and explains how to integrate this framework into any organizational culture. Download the full ODU guide!
The NIST Cybersecurity Framework & the Importance of Proper Documentation
Overview of the NIST Cybersecurity Framework and why proper documentation is essential for risk management, compliance, incident response, and organizational security.
Managing Cybersecurity Change: Using Tactical Empathy to Overcome Resistance
Examines how tactical empathy improves cybersecurity change management by reducing resistance, strengthening communication, and supporting successful adoption of new security practices.
Security Polices from a CISO’s Perspective
Explores security policies from a CISO’s perspective, highlighting their role in governance, risk management, strategic decision-making, and building organizational security.
Malicious Code and Activity – Mitigation Methods
Overview of malicious code threats and mitigation methods, including detection, containment, system hardening, user awareness, and modern cybersecurity defenses.
Ensuring Accessibility when Implementing the CIA Triad
Examines how to preserve accessibility while implementing the CIA Triad, ensuring systems remain usable, resilient, and secure without disrupting organizational operations.
Human Factors Cybersecurity Engineering: Inclusive Design through Social Science
Explores how human factors and social science inform cybersecurity engineering, focusing on inclusive design, usability, error reduction, and stronger security outcomes.
Network & Cyber Security: Tools, Costs, and Efficiency
Overview of network cybersecurity tools, comparing costs, efficiency, and how organizations evaluate firewalls, SIEMs, IDS/IPS, and other defensive technologies.
The NotPetya Cybersecurity Attack & Breach
Explains the NotPetya cybersecurity attack, how it spread, why it caused widespread damage, and the key lessons learned about resilience, segmentation, and global cyber risk.
Cybersecurity Incidents & Law Enforcement
Examines how law enforcement responds to cybersecurity incidents, including evidence collection, jurisdiction challenges, investigative processes, and interagency collaboration.
IT Infrastructure: Internet of Things (IoT)
Examines how the Internet of Things (IoT) impacts IT infrastructure, including connectivity, automation, security risks, management challenges, and modern network requirements.
Internet of Things (IoT): Security Challenges
Explores key IoT security challenges, including weak authentication, poor patching, privacy risks, large attack surfaces, and vulnerabilities in connected devices.
Computer Security vs. Information Security
Explains the difference between computer security and information security, including their goals, scope, protective controls, and roles in organizational risk management.
Linux Exercise – File Permission
Explains Linux file permission concepts, including read, write, execute rights, ownership, and how proper permission management enhances system security.