CIA Triad

The CIA Triad is basically a security model for organizations and businesses. The C stands for confidentiality, the I stands for integrity and the A stands for availability. All three components were formed at different times and not necessarily by a single founder. Confidentiality was formalized in a 1976 U.S. Air Force Study. Integrity was…

SCADA Systems

A few vulnerabilities of critical infrastructure systems are network segmentation, DdoS attacks, and malware attacks. Network segmentation is an approach that divides a network into multiple segments allowing administrators to control the flow of traffic. Ddos attacks is a type of malicious attack that can mess with an organization’s public cloud infrastructure. All of these…

Human Factor in Cybersecurity

I would honestly just not train as many people or just make them sign certain contracts that lets them know there will be consequences if they ever did something to hurt the company’s data. One of the readings made a very good point about how there is too much data being shared and created and…