In this write-up, we explore the SCADA Systems article to better understand thevulnerabilities that affect critical infrastructure and how SCADA applications help reduce theserisks. SCADA systems play a vital role in controlling and monitoring essential services such asutilities, energy, water, and transportation networks. Because these systems are so critical toeveryday life, protecting them from potential…
Category: CYSE 200T
Balancing Cybersecurity Investments: Training vs. Technology
In this write-up, we explore the role of cybersecurity investments to better understand thevulnerabilities that arise from human error and technological gaps, and how a combination oftraining and cybersecurity tools can help reduce these risks. Employees play a vital role inmaintaining organizational security, while technological defenses provide automated protectionagainst a wide range of threats. Because…
CIA Write Up
Understanding the CIA Triad and the Roles of Authentication vs. Authorization In this paper we discuss the CIA Triad (Confidentiality, Integrity, and Availability) which form the foundation of information security. Strong security also requires a clear distinction between authentication and authorization. This paper explains each principle and shows how they work together to protect data.CIA…