Cybersecurity Technol-Society
-
Write Up – April 16, 2026
Read more: Write Up – April 16, 2026The Human Factor in Cyber Security Cyber security Budget Allocation: Balancing Training and Technology BLUF:With a limited cybersecurity budget, I would balance funding between employee training andcybersecurity technology but place a slightly greater emphasis on training. This is because manycyber threats are caused by human error, meaning even the best technology can fail if users…
-
Write Up – April 09, 2026
Read more: Write Up – April 09, 2026SCADA Systems BLUF:Critical infrastructure systems are vulnerable to cyberattacks because they rely onconnected networks and sometimes outdated security. SCADA systems help manage andmonitor these systems, but they also create risks that need to be secure properly (p.3,SCADA Systems). Introduction:Critical infrastructure incudes systems we depend on daily, like electricity, water, andtransportation. These systems use SCADA (Supervisory…
-
Write Up – February 15, 2026
Read more: Write Up – February 15, 2026The CIA Triad and the Difference Between Authentication and Authorization BLUF:The CIA Triad is basically the backbone of cybersecurity. It stands for Confidentiality, Integrity, andAvailability. These three things help make sure information stays safe, accurate, and accessible.Authentication and authorization are also super important. They decide who can log in and what they cando once they’re…


