SCADA Systems

Mission critical infrastructure is just as vulnerable to cyber-attacks as normalinfrastructure. This is why Supervisory Control and Data Acquisition (SCADA) systems are alsovulnerable to attacks. The article states “In numerous cases, there remains less or no security onactual packet control protocol” (SCADA Systems p. 6). This represents a very big problem asmost of the systems…

The Human Factor in Cybersecurity

If I was the acting Chief Information Security Officer I think training is the mostimportant thing money can be spent on. You could spend money on fancy tools and such butwhen the rubber meets the road training is the most powerful tool. Funding training in thedepartment is extremely important to instill cybersecurity ideas into the…

The CIA Triad Write Up

The CIA Triad Write UpDescribe the CIA Triad, and the differences between Authentication & Authorization. The CIA Triad is a core concept in the cyber security industry. It stands for Confidentiality, Integrity, and Availability. Confidentiality is the first pillar of the triad and it means can you keep the data private or limit access to…