Final ePortfolio Selections
Discussion Board: The NIST Cybersecurity Framework
Based on my readings from the Cybersecurity Framework link, I have found that there are several benefits that companies or organizations can gain from using this. What is probably the most beneficial aspect of this is companies using these guidelines as a means to manage potential risks in a more efficient manner. It’s not meant to necessarily replace a businesses’ existing program, but rather to accentuate the already implemented plans. Much like several other organizations’ plans, there are important bullet-points to make the Framework function as a whole: Identify, Protect, Detect, Respond, and Recover. Each of these points perform an important role in providing a secure network within the organization and if utilized properly, this will reinforce the level of security, thus performing its task as not only a guideline, but an extra level of defense against any potential malicious intent.
I would use the Framework at my future workplace as a means to fully protect myself and others from potential threats. Whether I enter the workplace through an entry level position or in upper management, the policy and procedures within the Framework act as an overall method of security that can be used by anyone and should be used by everyone. I would do my best to make sure that those who I could reach would at least have some idea of what the Framework is and how they themselves could implement it.
Write Up: The C.I.A. Triad
to outline the integral parts of cybersecurity. These guidelines are divided in three parts; Confidentiality,
Integrity, and Availability.
Confidentiality in the Triad is a concept that embodies privacy. It means that there are steps
taken in order to ensure that important information is protected from unauthorized access attempts,
whether it be accidental or intentional. An example of this would be something as a passcode that only
financial officers have for a company’s financial records. Only certain employees would need to know of
this crucial information, however, access to said information is required so only those individuals would
have it.
Integrity, the second part of the Triad refers to the accuracy and trustworthiness of your data.
The information that is held within an organization means nothing if it is not accurate or has been
altered in some way, shape or form. This would mean that there has been a breach confidentiality.
Availability, the third part of the Triad, means that all the information or data can be accessed by
the appropriate parties. Passwords must work correctly, key cards must work, any means of accessing
information for an organization must function properly for it to be run efficiently. This even includes
having some sort of backup means of accessing information just in case the primary means is
compromised in some way.
means verifying who someone is when attempting to gain access to certain data. Authorization is the
process of verifying what specific applications and or data that a user has access to. For example,
authentication is used by employees to gain access to a human resources site hosted by their employer
to view personal information like pay, vacation time and sick leave.
Authorization can be described as certain levels of access being available to certain employees
in an organization. That could be your standard employee having access to basic records while
supervisors and human resources managers would have access to more sensitive information not
available to everyone else.
What is the difference between authentication and authorization, 3, March 2023, accessed 17,
September 2023 <https://www.sailpoint.com/identity–library/difference–between–authentication–and–
authorization/#:~:text=So%2C%20what%20is%20the%20difference,a%20user%20has%20access%20to.>
What is the C.I.A. Triad?, accessed 17, September 2023
<https://www.fortinet.com/resources/cyberglossary/cia–
triad#:~:text=The%20three%20letters%20in%20%22CIA,and%20methods%20for%20creating%20solutio
ns.>
What is SCADA?
SCADA is an acronym for Supervisory control and data acquisition. It is a control system that uses computers, networked data, graphic user interfaces for supervision of machines and processes. (https://en.wikipedia.org/wiki/SCADA) These processes are typically used at process plants or other machinery that must interact with programmable controllers
SCADA Vulnerabilities
Much like several other technologies that are used in conjunction with several programs to perform a task, there can be some problems that arise that could be detrimental and result in a cease of production. One thing that I became aware of while conducting my research was the lack of a fail-safe system. In the article, it was stated that a Supervisory Station (or Master station) can have multiple servers or disaster recovery sites.( https://www.scadasystems.net/) While it is a good idea to take precautionary measures such as this, a specific virus attack could cause a malfunction to intentionally run through all the supervisory stations, making them all crash. It is possible to have a multitude of programs lined up to attempt to prevent this from happening in the first place, but as we have learned from some cyberattacks in the past, any determined individual will attempt to find a way to attack a specific system if they so choose to.
What can be done?
The value of the HMI, or Human Machine Interface can be labeled as invaluable when talking about the importance of protecting SCADA Systems. As mentioned previously, a virus powerful enough to take down a SCADA System along with its several Supervisory Stations would mean production would have to be ceased potentially indefinitely. However, the HMI would be useful during this event (provided the human involved has the proper training) since the person monitoring the SCADA system to begin with could potentially manually shut down the system before everything is permanently damaged or possibly prevent the cyberattack from happening in the first place if they are warned with enough time to react. It is also possible that the problem in the SCADA System could be a physical one. For example, a pipe at a water plant could have too much pressure built up and it could cause several others to explode, but due to the HMI, the operator is warned ahead of time and is able to shut the water off before any damage is done.
SCADA Systems revisited
SCADA systems are an important part of our day-to-day operations and have been for several decades. As technology advances, we can hope to not only have a more secure means of monitoring our technology, but more efficient ways to maintain operations as well as new applications that can be developed to make continue to better SCADA Systems.
References:
SCADA Systems, accessed 5, November 2023, <https://docs.google.com/document/d/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY/edit>
SCADA, accessed 5, November 2023, <https://en.wikipedia.org/wiki/SCADA>
What is SCADA? SCADA Systems explained, accessed 5, November 2023, <https://scada-international.com/what-is-scada/#:~:text=What%20does%20SCADA%20stand%20for,data%20from%20the%20industrial%20equipment>