{"id":206,"date":"2026-04-23T14:50:42","date_gmt":"2026-04-23T14:50:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alewi073\/?page_id=206"},"modified":"2026-04-25T18:39:44","modified_gmt":"2026-04-25T18:39:44","slug":"cyse200t","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/alewi073\/cyse200t\/","title":{"rendered":"CYSE200T"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading\">Cybersecurity Technol-Society<\/h2>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-272 post type-post status-publish format-standard hentry category-cyse200t-write-ups\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/alewi073\/2026\/04\/25\/write-up-april-16-2026\/\" target=\"_self\" >Write Up &#8211; April 16, 2026<\/a><\/h2>\n\n\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">The Human Factor in Cyber Security Cyber security Budget Allocation: Balancing Training and Technology BLUF:With a limited cybersecurity budget, I would balance funding between employee training andcybersecurity technology but place a slightly greater emphasis on training. This is because manycyber threats are caused by human error, meaning even the best technology can fail if users&hellip; <\/p><\/div>\n\n<a class=\"wp-block-read-more\" href=\"https:\/\/sites.wp.odu.edu\/alewi073\/2026\/04\/25\/write-up-april-16-2026\/\" target=\"_self\">Read more<span class=\"screen-reader-text\">: Write Up &#8211; April 16, 2026<\/span><\/a>\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2026-04-25T18:28:21+00:00\">April 25, 2026<\/time><\/div>\n<\/li><li class=\"wp-block-post post-270 post type-post status-publish format-standard hentry category-cyse200t-write-ups\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/alewi073\/2026\/04\/25\/write-up-april-09-2026\/\" target=\"_self\" >Write Up &#8211; April 09, 2026<\/a><\/h2>\n\n\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">SCADA Systems BLUF:Critical infrastructure systems are vulnerable to cyberattacks because they rely onconnected networks and sometimes outdated security. SCADA systems help manage andmonitor these systems, but they also create risks that need to be secure properly (p.3,SCADA Systems). Introduction:Critical infrastructure incudes systems we depend on daily, like electricity, water, andtransportation. These systems use SCADA (Supervisory&hellip; <\/p><\/div>\n\n<a class=\"wp-block-read-more\" href=\"https:\/\/sites.wp.odu.edu\/alewi073\/2026\/04\/25\/write-up-april-09-2026\/\" target=\"_self\">Read more<span class=\"screen-reader-text\">: Write Up &#8211; April 09, 2026<\/span><\/a>\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2026-04-25T18:23:37+00:00\">April 25, 2026<\/time><\/div>\n<\/li><li class=\"wp-block-post post-267 post type-post status-publish format-standard hentry category-cyse200t-write-ups category-uncategorized\">\n<h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/alewi073\/2026\/04\/25\/write-up-02-15-2026\/\" target=\"_self\" >Write Up &#8211; February 15, 2026<\/a><\/h2>\n\n\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">The CIA Triad and the Difference Between Authentication and Authorization BLUF:The CIA Triad is basically the backbone of cybersecurity. It stands for Confidentiality, Integrity, andAvailability. These three things help make sure information stays safe, accurate, and accessible.Authentication and authorization are also super important. They decide who can log in and what they cando once they\u2019re&hellip; <\/p><\/div>\n\n<a class=\"wp-block-read-more\" href=\"https:\/\/sites.wp.odu.edu\/alewi073\/2026\/04\/25\/write-up-02-15-2026\/\" target=\"_self\">Read more<span class=\"screen-reader-text\">: Write Up &#8211; February 15, 2026<\/span><\/a>\n\n\n<hr class=\"wp-block-separator has-css-opacity\" \/>\n\n\n<div class=\"wp-block-post-date\"><time datetime=\"2026-04-25T18:14:06+00:00\">April 25, 2026<\/time><\/div>\n<\/li><\/ul><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Technol-Society<\/p>\n","protected":false},"author":32118,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/pages\/206"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/users\/32118"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/pages\/206\/revisions"}],"predecessor-version":[{"id":284,"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/pages\/206\/revisions\/284"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alewi073\/wp-json\/wp\/v2\/media?parent=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}