Write Up – April 16, 2026
The Human Factor in Cyber Security Cyber security Budget Allocation: Balancing Training and Technology BLUF:With a limited cybersecurity budget, I would balance funding between employee training andcybersecurity technology but place a slightly greater emphasis on training. This is because manycyber threats are caused by human error, meaning even the best technology can fail if users arenot properly educated. Discussion:Cybersecurity is often viewed as a technical issue, but based on what we’ve learned from thetext, the human element plays a...
read moreWrite Up – April 09, 2026
SCADA Systems BLUF:Critical infrastructure systems are vulnerable to cyberattacks because they rely onconnected networks and sometimes outdated security. SCADA systems help manage andmonitor these systems, but they also create risks that need to be secure properly (p.3,SCADA Systems). Introduction:Critical infrastructure incudes systems we depend on daily, like electricity, water, andtransportation. These systems use SCADA (Supervisory Control and Data Acquisition) tocontrol and monitor operations. While SCADA improves eQiciency, it also...
read moreWrite Up – February 15, 2026
The CIA Triad and the Difference Between Authentication and Authorization BLUF:The CIA Triad is basically the backbone of cybersecurity. It stands for Confidentiality, Integrity, andAvailability. These three things help make sure information stays safe, accurate, and accessible.Authentication and authorization are also super important. They decide who can log in and what they cando once they’re in. Authentication checks who you are, and authorization checks what you’re allowed todo. The CIA Triad:The CIA Triad is made up of three main ideas...
read moreCyber Security Professional Career Paper
Cyber Security Analyst Introduction:A cybersecurity analyst is responsible for protecting computer systems, networks, and data fromcyber threats. This job is important today because almost everything that we do is online, frombanking to school, to healthcare systems. Cyberattacks like phishing, ransomware, and databreaches happen constantly, so cybersecurity analyst work to prevent, detect, and respond tothese attacks. The purpose of this paper is to explain how social science concepts are used in thiscareer and how human behavior plays a...
read moreArticle Review #2
Understanding Cyber Crime And Social Behavior in the Digital Age Introduction:The article explores how cybercrime is influenced by human behavior, social structures, andtechnological access. The main takeaway (BLUF) is that cybercrime is not just a technical issue,but heavily shaped by social science factors like environment, opportunity, and behaviorpatterns. Relation/Connection to Social Science Principles:The article connects to several social science principles. First, it reflects rational choice theory,showing how people make calculated...
read moreArticle Review #1
Security Enhanced Cloud Computing Using the Integration of Dense Belief Network andRK-AES Algorithm Introduction/BLUF:The article by Al-Sadarini et al. (2025) examines how cloud security can be improved bycombining deep learning with encryption methods. As cloud computing becomes morewidely used for storing sensitive information, the risk of cyberattacks also increases. Theauthors introduce a hybrid framework called AES-RKDBN that detects intrusions using aDense Belief Network and encrypts data using an enhanced AES method before it is...
read moreJournal Entry – Week #14
When looking at the list, some actions stand out as much more serious because of how they can harm people or break major laws. The five most serious violations to me are faking your identity, sharing passwords or personal information of others, collecting information about children, bullying and trolling, and illegal searches on the internet. Faking your identity can lead to scams or manipulation, especially if someone is pretending to gain trust or access to sensitive information. Sharing someone’s private information is dangerous...
read moreJournal Entry – Week #13
The article on bug bounty program really shows how companies are using economic thinking to improve cybersecurity. Basically, bug bounties pay ethical hackers to find vulnerabilities in a company’s code, which helps companies catch bugs that they might have missed. The literature review pointed out that more eyes on a program mean more bugs get discovered, and even smaller companies can benefit because hackers aren’t super price sensitive. The study’s findings backed this up. The company side or revenue didn’t strongly...
read moreJournal Entry – Week 13
The article on bug bounty program really shows how companies are using economic thinking to improve cybersecurity. Basically, bug bounties pay ethical hackers to find vulnerabilities in a company’s code, which helps companies catch bugs that they might have missed. The literature review pointed out that more eyes on a program mean more bugs get discovered, and even smaller companies can benefit because hackers aren’t super price sensitive. The study’s findings backed this up. The company side or revenue didn’t strongly...
read moreJournal Entry #12
The GlasswasherParts data breach letter shows how both economic and psychological ideas show up in real world situations. From an economic perspective, rational choice theory fits because the company is taking deliberate steps to minimize losses and protect its customers. They weighed the risks and acted accordingly. Keynesian economic theory also applies since the company is actively trying to stabilize trust and confidence among its customers, similar to how governments use spending to maintain economic stability. On the psychology side,...
read more

