The Human Factor in Cybersecurity

First Duties As Chief Information Security Officer of a company, the first controls I would implement in the company would be measures to increase the company such as implementing two factor authentication, Personal Identity Verification (PIV) Cards or Common Access Cards (CAC) with a pin number to access the technology associated with company. I would…

Exploring Attacks on Availability

What are attacks on availabilityAttacks on availability on a network are attacks that prevent authorized users from accessing and using systems when they are needed. These attacks can be denial of service attacks that can overwhelm the system or network by flooding it with traffic. It can also be physical due to damage to the…

Identifying Risks, Threats, and Weaknesses in a System

Risk Identification is identifying threat vulnerabilities and estimating the likelihood of those threats being exploited and/or a potential vulnerability in the system that can harm an asset. Threats can be categorized as external or internal, natural or man-made, and/or intentional or accidental. Threats can cause a loss of confidentiality, integrity, and availability to a business…

The NIST Cybersecurity Framework

The Framework gives organizations standards and a common language for managing risk and creating and maintaining a stable cybersecurity environment. The Framework is not to replace any organization’s risk management process, but it’s implementations can greatly compliment it. The Framework Core’s function works to identify, protect, detect, respond and recover the organization from risks and/or…