{"id":352,"date":"2025-02-06T20:07:20","date_gmt":"2025-02-06T20:07:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/adanromero\/?page_id=352"},"modified":"2025-04-27T17:53:58","modified_gmt":"2025-04-27T17:53:58","slug":"odu-cyse-200t","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/adanromero\/odu-cyse-200t\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"\n<p><strong>Cybersecurity, Technology, and Society<\/strong><\/p>\n\n\n\n<p>This section features coursework completed during my time in this class. As part of the course requirements, I\u2019m showcasing a selection of my writing pieces<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>Cyber Roles &amp; Responsibilities<\/em><\/strong><\/h2>\n\n\n\n<p>An important role in a cybersecurity team is the system administrator. This is a critical role as they are responsible for setting up, maintaining and ensuring functionality of the system and network of an organization.<\/p>\n\n\n\n<p>System administrators are considered information system (IT) professionals. Their main job is ensuring the correct settings and network configuration on the company&#8217;s system. This also includes overseeing back ups, installing and updating hardware and software on computers. This means they have a good understanding of hardware and software as a whole. This is a technical role, as the administrator have to overlook the whole system and network.<\/p>\n\n\n\n<p>As previously mentioned , system administrators are an important role for a cybersecurity team. System maintenance and updates are considered a task for system admins. Cyber security threats often happen when software is not updated regularly. Threats can exploit bugs that may exist in older versions of the software. When one does not update software, these bugs continue to exist on current servers or systems. This leaves them vulnerable to threats, just waiting for a potent criminal to take advantage. This is why it is important for a system admin to ensure everything stays updated to the latest version.<\/p>\n\n\n\n<p>They also manage user accounts. These accounts are password protected and help ensure only authorized users can accuse the system. System admins set the credentials needed to log in. This helps ensure threats stay out, this is another reason why they are a part of the team.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>The CIA Triad and Security Concepts<\/em><\/strong><\/h2>\n\n\n\n<p><br><strong>Confidentiality<\/strong><br>Confidentiality refers to the protection of sensitive information. This concept ensures your<br>personal data can stay private and not accessible from unwanted viewers. An example of<br>confidentiality \u201caspects of training may include strong passwords and password-related best<br>practices\u201d (Chai, 2022, p. 2). This is important because one would not want sensitive information<br>of any sort to be accessible to anyone, especially to someone with the intent of criminal behavior.<\/p>\n\n\n\n<p><br><strong>Integrity<\/strong><br>Integrity focuses on maintaining trustworthiness of data throughout its lifecycle. If a company<br>does not have good security guidelines implemented. They can risk data being breached or<br>accessible to unwanted users. If data is breached this means a company does not have good<br>integrity. This concept ensures that integrity is maintained within a company, particularly when it<br>comes to securely storing personal information.<\/p>\n\n\n\n<p><br><strong>Availability<\/strong><br>Availability ensures that information is accessible when needed. This principle concept involves making sure systems are up and running, and users can access required resources.<\/p>\n\n\n\n<p><br><strong><em>Authentication and Authorization: Definitions and Differences<\/em><\/strong><\/p>\n\n\n\n<p><br><strong>Authentication<\/strong><br>Authentication is the process of identity of a user or device. It is the first step in ensuring that<br>only authorized individuals can access sensitive data. For example some common authentication<br>methods include biometrics, two-factor authentication, and digital certificates.<\/p>\n\n\n\n<p><br><strong>Authorization<br><\/strong>Authorization occurs after authentication. It determines what an authenticated user is allowed to<br>do. Authorization grants permissions to an authenticated user for certain resources. The best<br>example that helps me remember this is how school computers are set up. Students have access<br>to the internet but are only granted permission to websites that help educationally. Websites such<br>as netflix.com or Target.com would most likely be blocked.<\/p>\n\n\n\n<p><br><strong>Key Differences<\/strong><br>While Authentication and Authorization are related, they serve different purposes in the security<br>framework. Authentication ensures the individual is who they claim to be, while Authorization<br>manages the actions they are permitted to perform. Another example is the analogy where<br>Authentication is like showing your ID at the door of a bar, while Authorization is the permission<br>to enter and drink based on the ID check.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br><strong>Conclusion<\/strong><br>In conclusion, the CIA Triad, which refers to confidentiality, integrity, and availability. These<br>\u201cthree concepts, when viewed together as an interconnected system rather than as independent<br>concepts, can help organizations understand the relationships between them&#8221; (Chai, 2022, p. 1).<br>These principles work together to ensure that sensitive data is protected, trustworthy, and<br>accessible only to those authorized to access it. Understanding the difference between<br>authentication and authorization further strengthens security measures. Organizations can create<br>secure principles to keep their data protected.<\/p>\n\n\n\n<p>References<br>Chai, W. (2022, June 28). What is the CIA Triad? Definition, explanation, examples. Retrieved<br>from<br>https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view?usp=sharing<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><em>The Human Factor in Cybersecurity<\/em><\/strong><\/h2>\n\n\n\n<p><strong>What if role as Chief Information Security<\/strong><\/p>\n\n\n\n<p>As a Chief Information Security Officer (CISO), one of the main responsibilities is to<br>ensure the security of the organization. This includes the networks, data and staff training. While<br>being mindful of the organization&#8217;s budget, one should consider how complex cyber threats are.<br>There needs to be a careful balance of investing in the training of employees and the update of<br>technology. Both elements are important, but how I allocate resources would depend on several<br>factors. The factors that need to be considered are the organization&#8217;s risk profile, and the current<br>cybersecurity infrastructure.<\/p>\n\n\n\n<p><br>Is the company high profile and prone to receive cyber attacks? Perhaps the company is a<br>small start up company with few employees. Regardless of the size of the company, the best way<br>to ensure security with a budget in mind is training employees. I believe this is the most cost-<br>effective way to reduce the human error of cybersecurity risks. Many threats like phishing<br>attacks, social engineering, and password issues are caused by human error. A well trained<br>employee can recognize suspicious emails and know how to handle sensitive information. This<br>can only be achieved with the right training within the organization. This will create better<br>awareness and lower the chances of incidents happening within the organization. The growing<br>knowledge and teaching in a group setting should also help promote healthy and good cyber<br>habits.<\/p>\n\n\n\n<p><strong>References<\/strong><br>Payne, Brian K., Brittany Hawkins, and Chunsheng Xin. &#8220;Using Labeling Theory as a Guide to<br>Examine the Patterns, Characteristics, and Sanctions Given to Cybercrimes.&#8221; Journal Name, vol.<br>XX, no. X, 2018, pp. XX-XX.<\/p>\n\n\n\n<p><br>Payne, Brian K., and Lora Hadzhidimova. &#8220;Cybersecurity and Criminal Justice: Exploring the<br>Intersections.&#8221; International Journal of Criminal Justice Sciences, vol. XX, no. X, Year, pp. XX-<br>XX. https:\/\/ijcjs.com\/menu-script\/index.php\/ijcjs\/article\/view\/227.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society This section features coursework completed during my time in this class. As part of the course requirements, I\u2019m showcasing a selection of my writing pieces Cyber Roles &amp; Responsibilities An important role in a cybersecurity team is the system administrator. This is a critical role as they are responsible for setting&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/adanromero\/odu-cyse-200t\/\">Read More<\/a><\/div>\n","protected":false},"author":30291,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/pages\/352"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/users\/30291"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/comments?post=352"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/pages\/352\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/pages\/352\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/adanromero\/wp-json\/wp\/v2\/media?parent=352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}