SCADA Systems and Mitigating Vulnerabilities

(Originally written on November 2nd, 2024) Introduction to SCACA Systems: SCADA, which stands for Supervisory Control and Data Acquisition, refers to the systems used to control critical infrastructure processes. These systems allow control and the overall gathering of data from the industrial equipment to be done remotely rather than on site. SCADA constantly monitors the…

Protecting Availability as CISO

“If you were the CISO for a publicly traded company, what are some protections you would implement to ensure availability of your systems?” One of the main actions I would take for protecting the availability of the company’s systems would be ensuring that there are regular backups of the data present in the system. This…

CIA Triad Write-Up

(Originally written on September 15th, 2024) General Overview:             The CIA Triad is defined as “a model designed to guide policies for information security within an organization.” (Chai 2022). This model is composed of three parts : Confidentiality, integrity, and availability. All of these parts provide a solid foundation for an organization’s policies and are…