On this page, I am going to describe the CIA Triad and the differences betweenAuthentication & Authorization. CIA Triad There are many ways to explain the CIA Triad but the best way I would explain it would be the three fundamental concepts that together are commonly referred to as the CIA triad and affect information security policy for any organization are confidentiality,…
Cybersecurity Under Information Technology (IT)
On this page, we will discuss why cybersecurity should be under information technology in a business and all the reasons why. Shared Technologies and Expertise Considering there is a large overlap in technology and experience, it is greatly beneficial to the company and employees working in the department to bring together the cybersecurity department within…
SCADA Systems
On this page, I am going to discuss SCADA Systems, explaining the vulnerabilities associated with SCADA systems and the critical infrastructure systems. I also will discuss how the SCADA applications play a role in these risks. The vulnerabilities associated with critical infrastructure systems There are many vulnerabilities associated with critical systems and infrastructures that happen…