Michelle Corcoran 11/7/25 Critical infrastructure systems control important parts of national and economical security. To protect these systems, SCADA systems can be utilized. This provides a way to properly monitor, control, and respond to threats. Vulnerabilities in critical infrastructure systems Vulnerabilities in critical infrastructure systems are a major concern in today’s world because so much…
Chief Information Officer (CIO) and responsibilities
Michelle corcoran 9/12/25 In an IT department, the CIO is a high ranking executive. They oversee all aspects and manage technology. They’re important for keeping the department running smoothly and improving upon areas. What a CIO is The CIO is a high-ranking executive who is responsible for managing and overseeing a company’s information technology strategy…
IT within businesses
Michelle Corcoran 9/12/25 There are multiple components of every business from customer service to IT. Each part is unique and adds value to the overall organization. IT can serve as a backbone to all other departments and achieve high efficiency within itself. The parts of a business Besides the typical components of a business, other…
The CIA triad
Michelle Corcoran 9/17/25 The CIA triad secures data through confidentiality, integrity, and availability. Authentication is the process of verifying identity while authorization grants access. Together, they protect information from unauthorized access. The CIA triad The CIA triad stands for “Confidentiality, Integrity, and Availability.” This is a model that would be referred to as common and…