Confidentiality, integrity, and availability in cybersecurity represent the CIA triad. This is a model designed to direct policies for security within an organization.The C in the acronym stands for confidentially, basically meaning privacy. Confidential measures are made to stop delicate information from unauthorized access attempts. Examples of keeping confidentiality are encryption. Two-factor authentication is starting…
Write UP: SCADA Systems
SCADA Systems SCADA stands for Supervisory Control and Data Acquisition. This system controls, monitors, and analyzes industrial devices and processes worldwide. The information goes from remote plants to headquarters, the elements of SCADA include sensors and actuators, PLCs, remote terminal units, telecommunications, and SCADA clients and servers. When it comes to cyber vulnerabilities in engineering…
NIST Framework
This framework provides a common language for managing and expressing cybersecurity for external and internal stakeholders. It can be used to supervise cybersecurity risk and it can also be used to focus on delivering critical services within an organization. The frameworkâs core is made up of a few key concepts that include; identifying, protecting, detecting,…
Journal #3
Researchers could use this information to study what countries are facing the most breaches and what types of breaches. With this information you could dig deeper into why these places are getting targeted the most and looking at the type of attacks in different states we can try to implement tack tacks to help these…
Journal #2
The first principle we discussed is parsimony. I remember learning in CYSE 200 about writing as clearly and concisely as possible and I feel like that goes with parsimony because all parsimony says is that we should keep our explanations as simple as possible. Determinism means that behaviors are caused, determined, or influenced by preceding…
Journal #1
After reviewing the NICCS Framework the areas that interest me the most are Collect and Operate, and Protect and Defend. I appreciate Collect and Operate because this is the area where you collect intelligence and use it to help us better your security. I find this important because this is the first step to bettering…