SCADA Systems

BLUF SCADA systems and critical infrastructure typically contain inherent vulnerabilities that, if ignored, can lead to cyber attacks. The constant growth of technology and the increasing rise of cyberattacks emphasize the necessity of developing sufficient mitigation strategies. Examples of common mitigation strategies or technologies include firewalls, intrusion prevention and detection systems, passkeys, continuous security monitoring,…

Allocating Funds Between Training and Technology

BLUF With a certain amount of funds available, 55-65 percent of the funding is allocated to human training, with the remaining funds supporting additional cybersecurity technologies. Introduction Cybersecurity is an ongoing development that changes daily. With the number of cyber attacks increasing, companies must find a way to balance human training with the addition of…

CIA Triad Write-up

The CIA Triad is an acronym for confidentiality, integrity, and availability. Confidentiality in cybersecurity is the concept that private information is only seen by authorized users. With integrity being consistent in showing accurate data. While availability is having the data being accessible when needed. According to Anirudh Khana in Securing an Enterprise. “The CIA Triad…