Lab 1 – Install Linux VM

This lab introduced me to the concept of virtual machines (VMs), as well as the virtual machine I used for the rest of the course; Oracle VirtualBox. There were no challenges for in this lab. Overall, the lab taught me basic commands of linux and what they do, such as echo which prints user text,…

Discussion Board Post: Protecting Availability

Prompt You are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)? There are multiple protections I would employ to protect my systems, one of them being utilizing the Principle of Least Privilege to prevent employees from accessing resources they should not be able…

Write-Up: SCADA Systems

Prompt Explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks. This write-up describes what SCADA systems are, vulnerabilities that are related to critical infrastructure systems, and how SCADA systems can mitigate these issues. SCADA (which stands for Supervisory Control and Data Acquisition) systems are industrial control…

Write-Up: The CIA Triad

Prompt Describe the CIA Triad, and the differences between Authentication & Authorization, including examples of each. This write-up describes what the CIA triad is as well as the difference between authentication and authorization and provides examples to better help explain each topic. The CIA triad is a set of three different concepts that are the…