This lab introduced me to shell scripting in Linux and how scripts can automate tasks using conditional statements. I created and edited a .sh script using a text editor, made it executable with chmod +x, and ran it from the terminal to observe the output. The script used conditional logic to make decisions based on…
Category: CYSE 200T
Discussion Board Post: Protecting Availability
Prompt You are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)? There are multiple protections I would employ to protect my systems, one of them being utilizing the Principle of Least Privilege to prevent employees from accessing resources they should not be able…
Write-Up: The CIA Triad
Prompt Describe the CIA Triad, and the differences between Authentication & Authorization, including examples of each. This write-up describes what the CIA triad is as well as the difference between authentication and authorization and provides examples to better help explain each topic. The CIA triad is a set of three different concepts that are the…
Write-Up: SCADA Systems
Prompt Explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks. This write-up describes what SCADA systems are, vulnerabilities that are related to critical infrastructure systems, and how SCADA systems can mitigate these issues. SCADA (which stands for Supervisory Control and Data Acquisition) systems are industrial control…