Cybersecurity Technol-Society

  • Write Up – April 16, 2026

    The Human Factor in Cyber Security Cyber security Budget Allocation: Balancing Training and Technology BLUF:With a limited cybersecurity budget, I would balance funding between employee training andcybersecurity technology but place a slightly greater emphasis on training. This is because manycyber threats are caused by human error, meaning even the best technology can fail if users…

    Read more: Write Up – April 16, 2026
  • Write Up – April 09, 2026

    SCADA Systems BLUF:Critical infrastructure systems are vulnerable to cyberattacks because they rely onconnected networks and sometimes outdated security. SCADA systems help manage andmonitor these systems, but they also create risks that need to be secure properly (p.3,SCADA Systems). Introduction:Critical infrastructure incudes systems we depend on daily, like electricity, water, andtransportation. These systems use SCADA (Supervisory…

    Read more: Write Up – April 09, 2026
  • Write Up – February 15, 2026

    The CIA Triad and the Difference Between Authentication and Authorization BLUF:The CIA Triad is basically the backbone of cybersecurity. It stands for Confidentiality, Integrity, andAvailability. These three things help make sure information stays safe, accurate, and accessible.Authentication and authorization are also super important. They decide who can log in and what they cando once they’re…

    Read more: Write Up – February 15, 2026