Regarding people in cybersecurity, people play a crucial role alongside technology and processes. However, organizations must often pay more attention to training and educating employees on cybersecurity best practices.
Therefore, the allocation of a limited budget for cybersecurity should prioritize a balanced approach between training and technology investments, but the foremost priority should be given to training and then technology.
The training allocated would be understanding cyberattack techniques such as phishing, ransomware, social engineering, and other common tactics used by cybercriminals. For the cybersecurity side, the budget would be allocated towards antivirus, firewalls, and other important defense mechanisms needed to protect the organization’s systems and data. In balancing the tradeoff between training and additional cybersecurity technology with a limited budget, a strategic approach must be taken to ensure effective risk mitigation as it is to prioritize investments that address both human factors and technological vulnerabilities to achieve a holistic approach to cybersecurity.
The reason why training should be prioritized is because humans are often the weakest link in cybersecurity and play a significant role in many cyber threats (Malik, 2023.) With proper training, even the most advanced cybersecurity technology can be rendered effective. Additionally, investing in training allows organizations to develop an internal capability to address cyber threats proactively and respond effectively to incidents.
As noted by Sydney, “Software and hardware solutions are the tools security teams will use to create your cybersecurity framework.” Therefore, next on the list would be the deployment of essential cybersecurity technologies that align with the organization’s risk profile and specific needs. Firewalls and antivirus software are necessary for safeguarding the network infrastructure. the network infrastructure, while antivirus software helps detect and prevent malware infections in case users accidentally click on malicious links.
Using The CIA Triad
The CIA Triad is vital as it helps to ensure the implementation of a comprehensive and effective cybersecurity strategy. However, many people argue that more than the Triad is needed to cover all aspects of protection, hence the introduction of Authorization and Authentication (Shortened to AA) to strengthen security.
Real-life situations where AA works in tandem with the CIA Triad include a social media site like Facebook, requesting an individual to put in their User ID and password as authentication, and then only being granted into the platform (Authorization) to access their profile and interact with others. Other forms of authentication, such as MFA or 2FA, encrypt the data further, only authorizing users with valid credentials to access sensitive information (Prakash.) AA helps strengthen data protection as all aspects of the CIA are enacted.
The CIA Triad is a shortened acronym that stands for “Confidentiality, Integrity, and Availability.” According to Chai, Confidentiality means the privacy or secrecy of information from unauthorized disclosure. Integrity refers to maintaining the trustworthiness of data by ensuring that it is not altered or tampered with. Furthermore, Availability refers to the accessibility of information for authorized users (Chai, 2023.)
Authentication and Authorization are two vital aspects of access control in the field of cybersecurity, as they both play crucial roles in ensuring the security of information and resources. Authentication helps determine the user or the system, and this ties in with Authorization as it ensures that the user is who they claim to be and is either granted or denied access to specific resources or actions based on the authenticated user’s permissions (Mehta, 2021.)
Afterwards
There are many comprehensive sets of protections to ensure the availability of our systems. However, one of the main priorities is implementing a robust backup and disaster recovery plan. This plan will include regular backups of all critical systems and data, both onsite and offsite, to protect against permanent loss in case of a cyberattack or system failure. Another protection to improve availability is using redundant systems and infrastructure. This redundancy will ensure that backup systems are in place if one system or component fails to take over and maintain availability seamlessly.
Other more minor yet important protections I would include are regular testing and drilling of our backup and disaster recovery processes to ensure they are practical and can be executed smoothly in times of need.
Citations
Chai, W. (2023, February 10). What is the CIA triad? definition, explanation, examples:
TechTarget. WhatIs.com. https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA
Mehta, M. (2021, January 7). The difference between authentication and authorization –
explained in detail by a security expert. InfoSec Insights. https://sectigostore.com/blog/the-difference-between-authentication-and-authorization-explained-in-detail-by-a-security-expert/
Malik, K. (2023, January 16). Are humans the weakest link in cyber security? Astra
Security Blog. https://www.getastra.com/blog/security-audit/humans-in-cyber-security/#:~:text=There%27s%20no%20denying%20that%20humans,staff%20into%20giving%20them%20access.
Prakash, M. (n.d.). CIA Triad in cyber security: Definition, examples, importance.
KnowledgeHut. https://www.knowledgehut.com/blog/security/cia-in-cyber-security
Wess, S. (2023, February 9). How to make a cybersecurity budget [with template] |
clutch.co. How to Create a Cybersecurity Budget [with Template]. https://clutch.co/resources/how-to-make-a-cybersecurity-budget