I learned a lot about how technology connects to cybersecurity and real-world problems.
One thing I learned is how cyber technology can make it easier for people to commit crimes, like hacking or stealing information. It showed me why security is such a big deal today.
I also learned that culture plays a role in cybersecurity, because different people see privacy and technology in different ways. That can affect how systems are protected.
Another thing I worked on is communication. I got better at explaining technical stuff in a way that actually makes sense, especially for people who aren’t in cybersecurity.
I also learned how cyber systems work and how small weaknesses can turn into security risks if they’re not handled right.
Lastly, I learned how cybercrime can impact people directly, like identity theft or privacy issues, which made everything feel more real.
Overall, this class helped me understand both the technical side and the human side of cybersecurity, and I feel more confident with it now
3 Posts

The idea of the short arm of predictive knowledge is that people used to think only about the immediate results of actions. In years back, certain actions would only affect a smaller group of people, and the effect wouldn’t even last long, so this would in turn make sense as to why we focus on short-term outcomes. These days, technology can influence and spread people’s actions like wildfire. when is comes to the future and also involving cyber policy and infrastructure, we must start thinking ahead so we can stop data breaches from happening instead of just reacting to them when it hits. When it comes to today, we need to plan for long term soultiomns in stead of that work. If we can stop a problem before it even happens, people will be safer. To ensure we me change in our mindsets today.

As technology continues to advance and become more interconnected. It is no longer feasible for the government to manage all related issues on its own. Companies and businesses play a role in shaping how certain technology is developed and used by consumers. With each of them having a role in this, they should also bear shared responsibility. While the government should continue to establish and enforce regulations, it must also collaborate with other stakeholders to keep pace with rapid change. At the same time, individuals need to be more mindful of how they use technology and how their actions affect others. In conclusion, the growing role of technology in everyday life requires a shared responsibility among governments, corporations, organizations, and the public.

A`Shaad Harris
CYSE 200T: Cybersecurity, Technology, and Society
Prof. Kirkpatrick
March 6, 2026
SCADA Systems and the Vulnerabilities of Their Critical Infrastructure.
Supervisory Control and Data Acquisition systems, or SCADA systems, are essential for
managing critical infrastructure. However, their transition from proprietary, isolated architectures
The networked IT-based systems have introduced serious Cybersecurity vulnerabilities. To protect
These systems, cybersecurity professionals must combine specialized industrial firewalls,
whitelisting, and VPNs to intercept the risks of unauthorized access and potential physical
destruction.
SCADA systems refer to industrial control systems (ICS) used to monitor and coordinate
infrastructure processes such as water treatment, gas pipelines, and power generation in real-
time. These systems utilize subsystems like Remote Terminal Units (RTUs) and Programmable
Logic Controllers (PLCs) to gather data from sensors and execute control actions. Because they
manage essential services, their reliability and security are paramount to public safety.
The shift in the security landscape of SCADA has gone through three generations of
architecture. The first generation is known as Monolithic. These were independent, mainframe-
based systems with no external connectivity. This means that they had to rely on exclusive
protocols for security. The second generation is the distributed generation. Its processing was
shared across multiple stations using a LAN. While this generation was more efficient, they still
used private protocols, which led to “security by obscurity,” a phenomenon where the actual
security level was unknown. The third and final generation is known as the networked
generation. This modern system uses standard protocols like TCP/IP and usually involve internet
connection. This connectivity increases vulnerability to cyberattacks, as standard network
exploits can now be leveraged against critical infrastructure.
Critical infrastructure faces two primary categories of threats via SCADA applications.
The first is unauthorized software access, which includes human interference or intentional
infections by viruses that can compromise the control of the host machine. The second is
network packet access. Many legacy control protocols lack built-in security. This means that
anyone who can access the network segment can potentially send packets to control SCADA
devices directly. Physical access to network switches can often bypass software-based
protections like VPNs.
To counter said vulnerabilities, modern SCADA applications are incorporating advanced
security measures. Firstly, specialized industrial solutions have been implemented.
As discussed before, industrialized VPNs have been put in place, as well as firewalls. They are both
specifically made for TCP/IP-based SCADA networks. Secondly, application whitelisting is used
to prevent unauthorized modifications to software applications. This ensures that only approved
processes can run. Lastly, there’s redundancy and ruggedization. To mitigate the risk of physical
attacks and hardware malfunctions, critical installations use redundant hardware and
communication channels that can take over automatically without interrupting service.
As SCADA systems become more integrated with standard networking technologies, the
“air-gap” myth, which states that they are safe simply because they are disconnected or
proprietary, has been debunked. While modern connectivity introduces risks of cyberterrorism
and warfare, the adoption of standardized security techniques allows for continuous
improvement in protecting the systems that underpin modern society.
Experience
In CYSE200T, I gained hands-on experience learning how cybersecurity connects to real-world problems. Throughout the course, I explored how technology can create opportunities for cybercrime and how different systems can also be used to prevent and respond to those threats.
I worked on assignments that helped me understand how cyber systems function, including how vulnerabilities in hardware, software, and networks can lead to security risks. I also looked at how cybercrime impacts individuals and businesses, which gave me a better understanding of the importance of protecting data and privacy.
Another important part of my experience was improving my communication skills. I practiced explaining cybersecurity concepts in a clear and professional way, which is important when working in teams or explaining risks to others.
Overall, this course helped me build a strong foundation in cybersecurity by combining technical knowledge with real-world applications and critical thinking.
Skills
- Understanding of basic cybersecurity concepts and how cyber systems work
- Ability to identify security risks and vulnerabilities in technology
- Knowledge of how cybercrime impacts individuals and organizations
- Strong critical thinking when analyzing cybersecurity problems
- Improved written and professional communication skills
- Ability to explain technical topics in a clear and simple way
- Awareness of ethical issues and responsibilities in cybersecurity
- Basic understanding of how culture and human behavior affect cybersecurity