Budget Strategies for New Technology and Training In this write-up we will be going over strategies that I will be utilizing to effectively allocate a budget for additions to cybersecurity technology as well cybersecurity training. First, I will go over monitoring efficacy of current systems that will be used to determine if new cybersecurity technology…
Author: msurr006
Overview of SCADA Vulnerabilities and Mitigation of Risks
Overview of SCADA Vulnerabilities and Mitigation of Risks Supervisory control and data acquisition (SCADA) systems are unique to the critical infrastructure system they control. This unique configuration of the SCADA systems also makes the mitigation of vulnerabilities to be unique as well. In this write-up, I will discuss vulnerabilities associated with critical infrastructure systems focusing…
CIA Triad, the Shield for Data
CIA Triad, the Shield for Data The CIA triad is confidentiality, integrity, and availability; the three characteristics of cybersecurity that professionals rely on to ensure the safety of data. Data safety is dependent upon both authentication, the verification of a user’s identity, and authorization, what the user can do with that data. In this write-up,…