CIA TRIAD
The CIA triad is a fundamental portion in cybersecurity that was integrated to help guide policies for Information Security inside of an organization. The acronym stands for Confidentiality, Integrity, and Availability and can also be seen as the AIC triad to rid the association with the Central Intelligence Agency. This triad wasn’t formed overnight, but was conceived over a span of years starting as early as 1976, with confidentiality as a study in the Air Force. Almost a little over a decade later in 1987, integrity became a point of interest seeing that public computing needed a way to keep account of record as well as data accuracy. The final concept, availability, gained prestige the following year, completing the triad as we know and honor today. Confidentiality is allowing authorized individuals or processes to manipulate or access information. Integrity is the preservation of information that restricts others from altering data, whether it be accidental or malicious. Availability is allowing for authorized users to access data whenever they need to do so.
Authenticity
The process of authentication is administered as a way to verify that the user is who they say they are. CSO Josh Fruhlinger explains that this is accommodated by the use of security such as passwords and techniques such as biometrics, security tokens, and cryptographic keys. Authenticity is an imperative factor that is weighted more towards the confidentiality section of the triad, which will determine whether the user is authorized to access the data. This is because certain data isn’t allowed for the public to view and is only accessible to individuals that have a direct understanding of why it should be accessed.
Authorization
Authorization allows for only individuals that meet the requirements to access specific data and information. This is put in place to prevent other users from accessing data that they are not qualified to handle. Systems integrate this by allowing administrators or creators of the data to select those who they deem appropriate to view. This concept is also weighted towards the confidentiality portion of the triad due to the fact that only certain individuals can access this data and isn’t available to the everyday person. Fruhlinger also states that an important way to enforce confidentiality is by establishing a need-to-know mechanism for data access, meaning that a system needs to verify that you are who you say you are.
Conclusion
The CIA Triad helps organizations by using policies and guidelines to help protect private information from others. With the use of authorization and authentication, this makes the confidentiality section of the triad strong and resilient. With all the benefits that come with using the triad, it can be predicted that it will last for many years to come without any unforeseen problems.
SCADA SYSTEMS
All industries in the United States, no matter what product is being produced, rely on SCADA systems to offer them a layer of protection from any form of danger; whether that be a natural disaster or a human-caused situation. SCADA, standing for Supervisory Control and Data Acquisition, systems are a mixture of hardware and software that act as sensors for equipment such as motors, pumps, or valves located on an HMI or Human-Machine Interface. On the HMI, the data collected by the equipment is then portrayed as a diagram for the worker to determine whether a function should be performed. Even with the most advanced technology, people will still try to unleash attacks in order for monetary gain or for notoriety, stopping at nothing to obtain it. SCADA experts are creating new ways to keep their systems secure from those with ill-intent.
Natural Vulnerabilities
When a critical infrastructure becomes damaged or destroyed, the majority of the population is going to speculate that it was caused by another person or a group of people. What some people don’t realize is that their environment is also a factor that must be taken into account when constructing critical infrastructures. In section 3 of the Reliability Engineering & Safety Systems article, written by Enrico Zio, he states that many critical infrastructures are exposed to other dangers such as aging and failure of equipment, climatic changes, and natural hazards; which can cause the servers to possibly disrupt, leading to failure. Having systems fail can lead to a chain of events happening that will end up harming the environment or people. SCADA mitigates these vulnerabilities by having multiple servers on stand-by in the likelihood of a future server failure. Zio also mentions that systems should not only be reliable but resilient in the aspect of being able to recover from disruptions. By having the servers ready in the instance of a system failure, the back-up servers will power on to keep the equipment functioning in place of the original systems.
Human-Made Vulnerabilities
People, in every nation, live their lives relying on industries to provide them with the necessities needed in order to survive. Industries rely on having a very resilient and complex security in order to prevent attacks or data breaches from happening on their systems as well as any disruptions. The people that maliciously hack companies normally don’t do it just because they think that can bypass the security, but do it in order to gain something that holds equal value such as money or fame. SCADA systems mitigate these problems by scanning through each application that is in use to detect any suspicious activity. By scanning apps, this decreases the amount of time for hackers to leave irreversible damage on the company’s programs.
Conclusion
The further we head into the future, the more people are going to rely on industries to supply them with the necessities to survive. SCADA systems are used to mitigate and reduce the damage of having a data breach, an attack, or in the occurrence of a natural disaster. Without these systems in place to provide an extra layer of security against others, or having computers that are resilient enough to power on during disruptions, the lives that we live today would be heavily impacted negatively. Hackers would be able to hold whatever information they steal and sell it to others or threaten to release it unless a ransom is paid. SCADA systems are a vital component to a company’s production by acting as sensors for industry equipment.
THE HUMAN FACTOR IN CYBERSECURITY
When it comes to balancing the tradeoff of training and additional cybersecurity technology, the primary concern is one of budget constraints. With a limited budget, it is important to carefully consider the best allocation of funds in order to maximize the security of an organization.
Knowing the Needs
The first step in this process is to determine the specific needs of the organization. This can be done by assessing the organization’s current cybersecurity posture and identifying areas where additional security measures are needed. Once the organization’s needs have been identified, the next step is to determine how much of the budget should be allocated to training and how much should be allocated to additional technology.
Training
Training is an important component of any security strategy. It is important to ensure that all employees are aware of the organization’s security policies and procedures and understand how to implement them. Training should also include topics such as the basics of cybersecurity, how to recognize and respond to potential threats, and how to use the organization’s security tools. It is also important to ensure that all employees are up to date on the latest security developments and trends.
Additional Technology
In addition to training, additional cybersecurity technology should also be considered. This could include tools such as firewalls, antivirus software, and intrusion detection systems. These tools can help to protect the organization from malicious actors and can provide an additional layer of security. It is also important to consider the cost of implementing and maintaining these tools.
Costs
When it comes to allocating the budget, it is important to consider the cost of both training and technology. Training can be expensive and the cost of implementing additional technology can also add up quickly. It is important to carefully weigh the cost of training and technology against the potential benefit of each. For example, if the organization is at a high risk of being targeted by malicious actors, then investing in additional technology may be more beneficial than investing in training.
Securing the Future
Finally, it is important to consider the long-term implications of the budget allocation. While training and additional technology can help to protect the organization in the short-term, it is important to consider how these investments will benefit the organization in the long-term. Investing in training can help to ensure that employees are up to date on the latest security developments and can help to create a culture of security within the organization. Investing in additional technology can also help to protect the organization from future threats and can help to reduce the cost of security over time.
Conclusion
In conclusion, when it comes to balancing the tradeoff of training and additional cybersecurity technology, it is important to carefully consider the needs of the organization and the cost of both training and technology. It is also important to consider the long-term implications of the budget allocation and how it will benefit the organization in the future. With careful planning and consideration, organizations can ensure that they are making the best use of their limited budget and are maximizing their security posture.