{"id":133,"date":"2025-02-02T22:36:46","date_gmt":"2025-02-02T22:36:46","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-04-28T15:28:21","modified_gmt":"2025-04-28T15:28:21","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/adeswinger\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Free-Writes\/Discussion Posts<\/h1>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Ade Swinger<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CYSE 200T<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Professor Duvall<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3\/26\/25<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"><strong>BLUF<\/strong>: Write-Up on SCADA systems, the vulnerabilities associated with critical<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">infrastructure systems, and the role SCADA applications play in mitigating risks.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">What Are SCADA Systems?<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The acronym SCADA stands for supervisory control and data acquisition, and they are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">systems used to control critical infrastructure, facility-based, or industrial processes. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">There are a few subsystems that make up the SCADA system, such as programmable <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">logic controllers, a device used to track data by human operators, and remote terminal <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">units that convert the signals sent by sensors into digital data. Knowing how important <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">these systems are to all kinds of processes in the world. Cybersecurity professionals <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">must understand the vulnerabilities that come with these systems.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">What Are the Vulnerabilities?<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">With our critical infrastructure being so dependent on SCADA systems, they are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">vulnerable to cyberwarfare and other serious attacks (SCADA Systems p.6.) According <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to the article, there are two major threats: unauthorized access to software and \u201cpacket <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">access to network segments that are hosted by SCADA systems.\u201d With the first one, it would <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">be human error or intentional attacks upon the control host machine. The second one <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">would be the lack of control protocol on the packets themselves. This allows for the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">possibility of attackers sending malicious packets with the intent of gaining control of a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA device. Additionally, I found out that in recent years, \u201cbrowser and web-based <\/span>technology has become a powerful tool for operators of infrastructure and industrial <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">systems,\u201d according to<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u2018Critical Infrastructure Systems Are Vulnerable to a New Kind of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cyberattack.\u2019<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This means attackers have another potential attack vector to gain full <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">access to these systems.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Mitigating Risks<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA applications are specific software pieces of the subsystems that make up the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">whole SCADA system to perform all the tasks necessary. These applications are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">continuously taking detective and protective measures to mitigate risks. Processes like <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">real-time monitoring, data logging, and cybersecurity and network protection are all <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">examples of what these applications do to protect these critical systems that are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">responsible for so many important things to people\u2019s livelihoods.<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><strong><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Conclusion<\/span><\/strong><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA systems are crucial to critical infrastructure, but their vulnerabilities are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">something all cyber professionals should care about. Unauthorized access and network-<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">based attacks highlight the need for cybersecurity measures strong enough to protect <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">these systems. Also, SCADA applications are a huge part of mitigating risks by <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">monitoring real-time, logging data, and protecting networks through firewalls and other <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">means. As cyber threats continue to grow and change, methods of strengthening the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">security of these systems are critical to maintaining and protecting critical operations.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Sources:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">8p2WeNHctGVboY\/edit?tab=t.0\u00a0<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\">https:\/\/coe.gatech.edu\/news\/2024\/02\/critical-infrastructure-systems-are-<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">vulnerable-new-kind-cyberattack\u00a0<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ChatGPT to gain a better understanding of the role of SCADA applications.<\/span><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<div>Ade Swinger<br \/>\nCYSE 200T<br \/>\nApril 6, 2025<br \/>\nProfessor Duvall<\/div>\n<div><strong>The Human Factor in Cybersecurity<\/strong><\/div>\n<div><strong>BLUF:<\/strong> Humans are the weakest link in any organization\u2019s overall cybersecurity,<br \/>\nso any budget decisions must reflect that.<br \/>\n<strong>Cyber Threats Still Target Human Mistakes<\/strong><br \/>\nAccording to a study done by PhishMe back in 2016, over 90 percent of all cyberattacks start with a phishing email. Ten years later, chances are this is still the case. With that being said, organizations must bear this fact in mind when allocating funds for security.<br \/>\nHuman error is our biggest threat, so how should we move forward?<\/div>\n<div><strong>Budget Allocation Strategy<\/strong><br \/>\nThe budget should be split 60\/40 with sixty percent of funds going toward human<br \/>\nsecurity training and awareness and forty percent of it going toward actual fortification of<br \/>\nsystems and security tools. By doing this, we can focus on the fact that people are the<br \/>\nweakest link in our security plan while also addressing the technological side of<br \/>\ncybersecurity.<\/div>\n<div><strong>Conclusion<\/strong><br \/>\nAs the importance of cybersecurity grows in every aspect of business, the importance of<br \/>\nemployee training continues to grow as well. While technical defense is still very<br \/>\nimportant, none of it matters if employees are making dangerous mistakes. By utilizing a<br \/>\n60\/40 split of the budget, this reflects the idea that systems are only as strong as those<br \/>\nusing them.<\/div>\n<div>References:<br \/>\nhttps:\/\/docs.google.com\/document\/d\/1QplIrfcKlmkSOuKt9i0Kte72kYrukFeCm1wj9<br \/>\nDxpnGU\/edit?tab=t.0#heading=h.iafeicx83xq5 \u2013 Why is Cybersecurity About<br \/>\nHuman Behavior?<br \/>\nhttps:\/\/www.darkreading.com\/endpoint-security\/91-of-cyberattacks-start-with-a-<br \/>\nphishing-email &#8211; 91% Of Cyberattacks Start With A Phishing Email<\/div>\n<\/div>\n<div><\/div>\n<div><strong>Discussion Board: Ethical Considerations of CRISPR Gene Editing<\/strong><br \/>\nMar 9, 2025 10:48PM<br \/>\nADE SWINGER<br \/>\nCRISPR gene editing, along with many potential benefits, also has many ethical considerations concerning misuse. The ability to change DNA could have unintended consequences under the scope of privacy and security. With CRISPR, the gene information has to be stored digitally, which is something that makes it vulnerable to attacks. People could gain access to the information and perform identity theft, amongst other possibilities. With this being a possibility, those in the IT teams of medical facilities must put in the proper cyber measures and access control, as Ms. Doris Locking suggested in her presentation. My position is one of optimism in regard to the future of gene editing, understanding that serious security has to surround it because of the delicate information it works with. I also believe the government should recognize this and put the right regulation in place to ensure the safety of citizens in a blanketed way.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Free-Writes\/Discussion Posts Ade SwingerCYSE 200TProfessor Duvall3\/26\/25 BLUF: Write-Up on SCADA systems, the vulnerabilities associated with criticalinfrastructure systems, and the role SCADA applications play in mitigating risks. What Are SCADA Systems?The acronym SCADA stands for supervisory control and data acquisition, and they are systems used to control critical infrastructure, facility-based, or industrial processes. There are a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/adeswinger\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30513,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/adeswinger\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/adeswinger\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/adeswinger\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adeswinger\/wp-json\/wp\/v2\/users\/30513"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adeswinger\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/adeswinger\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":311,"href":"https:\/\/sites.wp.odu.edu\/adeswinger\/wp-json\/wp\/v2\/pages\/133\/revisions\/311"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/adeswinger\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}