{"id":133,"date":"2024-09-25T16:16:00","date_gmt":"2024-09-25T16:16:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-12-03T23:53:14","modified_gmt":"2024-12-03T23:53:14","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/tjohn174\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">CIA Triad <\/h1>\n\n\n\n<p>Tavion Johnson<br>Charlie Kirkpatrick<br>CYSE 200T<br>September 4, 2024<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">The CIA Triad<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em>The CIA Triad &#8212; Confidentiality, Integrity, and Availability &#8212; is a baseline model we use for<br>information security in organizations.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Confidentiality:<br><\/strong>Confidentiality guarantees that sensitive information is secure and only available to<br>authorized users. This is important when protecting an organization\u2019s data and customer<br>information. Methods such as data encryption and secure communication channels are<br>put in place to help maintain the confidential part of information security within a<br>company.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Examples<\/strong>:<br>\u2022 Banks requiring account numbers and numbers when banking online<br>\u2022 Creating unique user IDs and passwords when creating accounts<br>\u2022 Using biometric verification and two-factor verification when securing accounts<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Integrity<\/strong>:<br>Integrity ensures that data remains accurate and consistent during storage or<br>transmission. This is essential for maintaining the reliability of business operating systems.<br>Methods such as checksums and digital signatures are used to detect and prevent<br>unauthorized users.<\/p>\n\n\n\n<p><strong>Examples<\/strong>:<br>\u2022 Using backup and recovery software on files and different data<br>\u2022 Businesses sending messages to users notifying them when someone logs into an<br>account<\/p>\n\n\n\n<p><br><strong>Availability<\/strong>:<br>Availability makes sure that all software is up to date and always running. This is good for<br>organizations because it makes their services accessible and reliable. This also creates<br>customers\u2019 trust, which ultimately leads to more business.<\/p>\n\n\n\n<p><br><strong>Examples<\/strong>:<br>\u2022 Companies repairing hardware failures<br>\u2022 Companies upgrading their systems<br>\u2022 Companies using firewalls and proxy servers to further reinforce information<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Authentication Vs. Authorization<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Authentication<\/strong>:<br>Authentication is the act of validating the identification of the user. Some systems require<br>more than one type of verification in order to access their system. This is known as multi-<br>factor authentication (MFA), and it is used to increase security beyond passwords.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Examples<\/strong>:<br>\u2022 Passwords<br>\u2022 one-time pins<br>\u2022 authentication apps<br>oSecurity codes<br>\u2022 Biometrics<br>o Face ID\/fingerprints\/voice recognition<\/p>\n\n\n\n<p><br><strong>Authorization:<br><\/strong>Authorization is the process of granting the user permission to access a website or<br>equivalent resource. This is also known as access control. You need to be authenticated to<br>get authorized.<\/p>\n\n\n\n<p><br><strong>Examples<\/strong>:<br>\u2022 Giving the user permission to download certain files on the server<br>\u2022 Providing users with administrative access to applications<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Conclusion:<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><br>The CIA Triad is a great framework to use when securing information, especially<br>when it comes to businesses. Knowing the difference between authentication and<br>authorization is crucial when taking safety and security measures into account. By having<br>these simple yet complex concepts, businesses can protect sensitive information,<br>maintain operational proficiency, and build trust with their consumers.<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">SCADA Systems <\/h1>\n\n\n\n<p>Tavion Johnson<br>Charlie Kirkpatrick<br>CYSE 200T<br>November 3, 2024<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Scada Systems<br><\/strong><em>The use of SCADA systems is a necessity when it comes to safeguarding the various<br>services the economy depends on. Critical infrastructure systems, which include water,<br>energy, communication systems, and transportation, are needed today. These systems are<br>all connected with the use of technology. With this come risks and vulnerabilities.<\/em><\/p>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center\"><strong>Vulnerabilities in Critical Infrastructure<\/strong><\/h4>\n\n\n\n<p><strong><br>\u2022 Cybersecurity Threats: <\/strong>With the increasing number of cyberattacks on critical<br>infrastructure, this is a significant vulnerability. Hackers can target these systems to<br>disrupt services, steal data, and cause physical damage. If these attacks are<br>successful, this can lead to outages or shortages, sensitive information being<br>compromised, and even threats to society.<\/p>\n\n\n\n<p><br><strong>\u2022 Aging Infrastructure: <\/strong>With the advancement of technology being so rapid, many of<br>these infrastructures are built on older systems. These systems are not very strong<br>in cybersecurity, which makes them more likely to be hacked.<\/p>\n\n\n\n<p><br>\u2022<strong> Physical Security Threats:<\/strong> Critical infrastructure is also vulnerable to physical<br>threats such as natural disasters, bombings, and insider threats. These things can<br>damage physical assets and disrupt operation processes<\/p>\n\n\n\n<h4 class=\"wp-block-heading has-text-align-center\"><strong>Roles of SCADA Systems<\/strong><\/h4>\n\n\n\n<p class=\"has-text-align-center\"><br><em>Supervisory Control and Data Acquisition (SCADA) systems play an important role in<br>making sure that critical infrastructure processes are flowing smoothly. These systems are<br>used to gather real-time data from various sensors and devices. Operators then use this<br>data to be able to check the system\u2019s performance.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>\u2022 Monitoring and Control: <\/strong>SCADA systems allow operators to continuously monitor<br>critical infrastructure systems in real-time. This allows for quick detection and rapid<br>responses to mitigate risks.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>\u2022<strong> Incident Response:<\/strong> SCADA systems can help map out incident response plans by<br>automating alerts and providing operators with detailed information about various<br>issues. This can reduce response times and minimize the impact of disruptions.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>\u2022 Cybersecurity features: <\/strong>These systems have built-in encryption and intrusion<br>detection to prevent sensitive data from being compromised. This ultimately<br>maintains the integrity of the operation.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>\u2022 Integration and Compliance:<\/strong> These systems can also help assist different<br>companies in maintaining compliance with various industry regulations and<br>standards, as well as integrating various technologies to build a stronger system.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><br><\/strong><em>In conclusion, the vulnerabilities associated with critical infrastructure systems are<br>a threat to the economy and national security. By using SCADA technology, various<br>organizations and companies can improve their critical infrastructure. SCADA ensures that<br>their operations are secure and durable even when coming across threats. As technology<br>continues to evolve, the integration of other technologies in SCADA will be a necessity for<br>safeguarding the various things society depends on<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Human Factor in Cybersecurity<\/h1>\n\n\n\n<p>Tavion Johnson<br>Charlie Kirkpatrick<br>CYSE 200T<br>November 17, 2024<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Human Factor in Cybersecurity<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><br><\/strong><em>\u201cBalancing the tradeoff between training and additional cybersecurity technology will lead<br>to a more efficient company with great security posture.\u201d<\/em><\/p>\n\n\n\n<p><br><strong>Risk Assessment<br><\/strong>I would like to start out by creating a risk assessment plan. From here, the company can find<br>their most critical assets and focus on protecting them.<\/p>\n\n\n\n<p><br><strong>Training \u2013 30%<br><\/strong>\u2022 It is crucial to prioritize training in cyber security. Since human error is common<br>throughout workspaces, there will always be a need for updated training. Well trained<br>employees can reduce the risk of security breaches the company faces.<br>o Phishing simulations are a good way to keep employees alert and on top of<br>things. (Wright and Thatcher, 2021)                                                                                                                       o Also enforcing good security practices such as password management and<br>keeping sensitive information secure<\/p>\n\n\n\n<p><strong>Security technology \u2013 40%<br><\/strong>\u2022 Having up to date technology is essential when running a company. The majority of<br>the funds should go towards this. The newest technology comes with the most<br>protection.<br>o Intrusion Detection Systems<br>o SCADA Systems<br>o Firewalls<br>o Antiviruses<\/p>\n\n\n\n<p><br><strong>Layered Security \u2013 15%<br><\/strong>\u2022 Having layered security further ensures the protection of a company.<br>o Encryption can be used when accessing sensitive in order to protect it<br>o Role Based Access Control makes sure that only certain people with certain<br>roles can access various information<br>o MFA adds an extra layer to each employee\u2019s account<br>o Updates and Patches<\/p>\n\n\n\n<p><br><strong>Monitoring and Response Plans \u2013 15%<br><\/strong>\u2022 Doing regular security audits ensures room for companies\u2019 improvement.<br>o Incident response plans<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><em>I would have 30 percent go to training, 40 percent towards technology, layered<br>security 15 percent, and Monitoring and Response plan 15 percent. This is the best way to<br>allocate these funds in order to have great security posture.<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Works Cited<\/h1>\n\n\n\n<p>Phishing Tests Are Necessary. But They Don\u2019t Need to Be Evil.<\/p>\n\n\n\n<p>hadzidimova) &#8211; 202410_CYSE200T_17489 CYBERSECURITY-TECHNOL-SOCIETY &#8211; Perusall                                               <\/p>\n\n\n\n<p>READING: Cybersecurity and Criminal Justice: Exploring the Intersections (payne-<\/p>\n\n\n\n<p>Cybersecurity &amp; Infrastructure Security Agency. \u201cHomepage | CISA.\u201d Cisa.gov, 2020,<br>www.cisa.gov\/.<\/p>\n\n\n\n<p>SCADA &#8211; Tech-FAQ. 6 Apr. 2019, www.tech-faq.com\/scada.html#google_vignette.<\/p>\n\n\n\n<p>\u201cSCADA Systems &#8211; SCADA Systems.\u201d Www.scadasystems.net, www.scadasystems.net\/<\/p>\n\n\n\n<p>Hashemi-Pour, Cameron. \u201cWhat Is the CIA Triad? Definition, Explanation and Examples.\u201d<\/p>\n\n\n\n<p>TechTarget, TechTarget, Feb. 2023, www.techtarget.com\/whatis\/definition\/Confidentiality-<br>integrity-and-availability-CIA.<\/p>\n\n\n\n<p>Okta. \u201cAuthentication vs. Authorization.\u201d Okta, 15 Oct. 2018, www.okta.com\/identity-<br>101\/authentication-vs-authorization\/.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CIA Triad Tavion JohnsonCharlie KirkpatrickCYSE 200TSeptember 4, 2024 The CIA Triad The CIA Triad &#8212; Confidentiality, Integrity, and Availability &#8212; is a baseline model we use forinformation security in organizations. Confidentiality:Confidentiality guarantees that sensitive information is secure and only available toauthorized users. This is important when protecting an organization\u2019s data and customerinformation. Methods such as&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tjohn174\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29855,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tjohn174\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tjohn174\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tjohn174\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tjohn174\/wp-json\/wp\/v2\/users\/29855"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tjohn174\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/tjohn174\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/sites.wp.odu.edu\/tjohn174\/wp-json\/wp\/v2\/pages\/133\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tjohn174\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}