{"id":14,"date":"2024-01-14T15:34:34","date_gmt":"2024-01-14T15:34:34","guid":{"rendered":"https:\/\/wp.pprd.odu.edu\/spring2017-met330-template\/?page_id=14"},"modified":"2025-03-03T20:36:14","modified_gmt":"2025-03-03T20:36:14","slug":"project","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/bequette\/project\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"\n<p>The following is the description for the course Cybersecurity, Technology and Society as taken from the course syllabus:<\/p>\n\n\n\n<p>Students will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains.<\/p>\n\n\n\n<p>This class was valuable in understanding the socioeconomic and political motivators behind cybersecurity. <\/p>\n\n\n\n<p>The following are examples of the papers and discussions contained within the coursework for the class as evidence to the learning outcomes I have achieved.<\/p>\n\n\n\n<p><strong>A Brief Explanation of the CIA Triad | Adrian Bequette<\/strong><br>CIA Triad Definitions<br>The CIA Triad comprises of three factors, for CIA in this instance is an acronym for<br>Confidentiality, Integrity, and Availability. Each of these three factors make up the outline of<br>rules and structure that should be implemented within a security architecture.<br>Confidentiality<br>Confidentiality is the assurance that sensitive and private informa\u019fon remains private, or<br>confidential. Confidentiality makes up one third of security, and its goal is the protection of<br>information and data from unauthorized persons. There are many different classifications of the<br>level of confidentiality of information, and the higher the level of sensitive nature the data has,<br>the stronger the controls to ensure it remains confidential are put in place.<br>Integrity<br>Integrity involves the security of information while it is in transition or across transportation.<br>Data or information must remain unaltered while in transit between sources and recipients.<br>Integrity also involved the key factor of non-repudiation, which is involved in signing<br>documentation or information. And example of non-repudiation and by the transitive property<br>integrity, is digitally signing a document to so that there is proof that you were the one to<br>validate the information contained within.<br>Availability<br>Availability is the final factor that ensures that data is always available. And example of good<br>availability is load balancing and data redundancy, so that in the event a publicly facing web<br>server goes down, there is redundancy with backups so that the informa\u019fon contained will still<br>be available to those trying to access it.<br>Conclusion<br>Contained within these three key factors of the CIA Triad are the makings of a security<br>framework that all entities must maintain. Following the three factors will ensure reputability<br>and security.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Vulnerabilities of Critical Infrastructure and the Benefits of SCADA<br>Implementation<\/strong><\/p>\n\n\n\n<p><br>Critical infrastructure systems are vastly important, and therefore are prime<br>targets for attacks. They include the systems used to manage power, water, internal<br>temperature regulation, communication systems and more. Fick gives the definition that<br>\u201ccritical infrastructure is the physical and virtual assets, systems, and networks that are<br>essential to society\u201d, and that their destruction can result in the loss of economic<br>stability, national security, and public health (p.1).<br>Implementation of standardized and centralized control for these processes is<br>where SCADA shows its value. Centralized control of these processes, utilizing various<br>different hardware and software means, allows for proper management of these<br>systems. SCADA at its core allows for remote operation, monitoring and control of<br>critical systems. Without SCADA, these systems are not networked and thus do not<br>have the proper monitoring they require. If an outage of power or occurs, using<br>centralized management means those systems are replaced or repaired quicker. In<br>most cases, SCADA can alert administrators to failure before it occurs, and as such<br>saves money and in some cases lives.<br>However, this does in turn create its own problems, where now there are more<br>centralized points of failure. As noted in the article by SCADA Systems, there now<br>exists 2 main threats to this centralization. The first is unauthorized access, and the<br>second is network connectivity. Neither of these issues have a non-zero percent chance<br>of happening. And in the event someone gains access to these systems, while they are<br>not connected to the internet, physical access means control for a threat actor. The second issue, network connectivity cannot be avoided but can be mitigated via alternate<br>connections.<br>While SCADA does bring its own issues into the mix, the ability to centrally<br>manage and maintain critical infrastructure systems highly outweighs their risks. When<br>referring to systems that can potentially cost lives, SCADA is the only option.<br><\/p>\n\n\n\n<p>References<br>Allie Fick, S. R. (2023, January 12). Critical infrastructure is more vulnerable than ever-<br>your industry could be a prime target. Lacework.<br>https:\/\/www.lacework.com\/blog\/critical-infrastructure-is-more-vulnerable-than-<br>ever-your-industry-could-be-a-prime-target\/<br>SCADA systems. SCADA Systems. (n.d.). https:\/\/www.scadasystems.net\/<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Discussion: Ethical Considerations of CRISPR Gene Editing<\/strong><\/p>\n\n\n\n<p>I think there is a very fitting quote out there that relates to this topic from Jurassic park; &#8220;we were so busy wondering if we could, we never stopped to ask if we should&#8221;. And that pretty much sums up my ideas about gene editing. I think that it is marvelous that we have hit a point in science that something like this is possible, but it still makes me wonder if we should take these matters into our own hands. I think there are a lot of pros and cons to this, but ethically i can see how this is some very murky water that needs to be taken very seriously, and with a lot of caution.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following is the description for the course Cybersecurity, Technology and Society as taken from the course syllabus: Students will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/bequette\/project\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28370,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bequette\/wp-json\/wp\/v2\/pages\/14"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bequette\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bequette\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bequette\/wp-json\/wp\/v2\/users\/28370"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bequette\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/bequette\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":140,"href":"https:\/\/sites.wp.odu.edu\/bequette\/wp-json\/wp\/v2\/pages\/14\/revisions\/140"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bequette\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}