{"id":123,"date":"2024-01-16T17:30:14","date_gmt":"2024-01-16T17:30:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2024-04-20T01:07:42","modified_gmt":"2024-04-20T01:07:42","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cbelf001\/cyse-301\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"<h1 style=\"text-align: center\"><strong>The Social Meaning and Impact of Cybersecurity-related Technical Systems<\/strong><\/h1>\n<p><em>Cybersecurity-related technical systems like the CIA Triad, SCADA Systems, and the NIST Framework play a significant role in today\u2019s society because they protect companies, infrastructure, and all kinds of digital systems from potential threats. As a result, in this paper, we will shine a light on supervisory control and data acquisition systems, the National Institute of Standards and Technology, confidentiality, integrity, and availability, and how they impact the social meaning of cybersecurity-related systems.<\/em><\/p>\n<p><em>\u00a0<\/em><\/p>\n<p><strong>Introduction<\/strong><\/p>\n<p>In this day and age, where the world is increasingly becoming surrounded by technology and its improvements, the need for cybersecurity-related technical systems is imperative if we want to establish preventative and protective cybersecurity measures. (1) In addition, the systems mentioned above (CIA Triad, Scada Systems, and NIST) are all strictly interconnected with one another because, in their uniqueness, they all provide ways that guarantee the security and reliability of sensitive information. In fact, the term SCADA was initially used in the 20th century to describe the need for mechanical control so that workers wouldn&#8217;t have to physically operate the equipment, according to the article &#8220;SCADA: Supervisory Control and Data Acquisition.&#8221; This allowed for the capability of remote control and supervision of infrastructure processes. In addition, according to the Chai article, the CIA Triad, also referred to as the AIC, to avoid confusion with the Central Intelligence Agency, is a model created to safeguard all data against data breaches, which is essential for the security of a business. Additionally, according to the NIST Cybersecurity Framework, numerous businesses have adopted NIST, or the National Institute of Standards and Technology, since its creation in 2014 in an effort to reduce the risk of cyberattacks and the subsequent exploitation of sensitive data. \u00a0Nevertheless, these security systems can present serious implications that might reverberate on things like privacy and trust.<\/p>\n<p><strong>The SCADA System\u2019s competencies and downsides<\/strong><\/p>\n<p>Supervisory Control and Data Acquisition is referred to by the abbreviation SCADA. This system is made up of a variety of hardware and software applications that are intended to manage industrial, facility-based, and infrastructure processes. The Remote Terminal Units (RTUs) and a program known as Programmable Logic Controllers (PLCs) enable the controlling activities. As a matter of fact, this program allows for the control of plants in a remote and local way, giving birth to automated processes. Real-time data collection, analysis, and processing are all possible with the SCADA system. Microprocessors like the Remote Terminal Units and Programmable Logic Controllers interact with the HMI (Human Machine Interface), and once the data is posted from processors to SCADA Systems, the human operators are able to take control. Members of the industry can view a representation of the plant in question with a schematic and graphic information provided by the HMI. Consequently, if the system has identified any issues, the operator has the ability to intervene remotely. However, SCADA systems have a downside. (2) The accumulation of hardware and software programs is quite complicated, and it demands highly skilled personnel capable of managing such programs. As if that isn\u2019t enough, these systems are more likely to be the subject of cyberattacks since maintaining and improving their effectiveness has high costs and also because they are in close contact with the internet. Also, their vulnerability to cyberattacks compromises the social meaning of cybersecurity-related systems because it questions the ethical responsibilities of personnel. (3) Furthermore, from a political and ethical perspective, to avoid the downside of SCADA systems, we can change some cyber policies by giving priority to individuals and their privacy, improving the company\u2019s transparency, focusing our attention on morals, and mitigating risks. Additionally, the downside of SCADA systems or of any other types of cybersecurity-related systems could be due to the \u201cshort arm\u201d of predictive knowledge. Being able to predict new cybertechnologies and, therefore, establish preventative designs isn\u2019t easy. In fact, it is really unlikely. Changes in the cyberworld can have a negative effect in the long run. The progression in technology will surmount predictive knowledge, and there isn\u2019t much we can do. The only way to try and overcome this progression is to promote learning, combat misinformation, improve the efficiency of technologies, etc. Even though all these methods might not be the right solutions, they\u2019ll still diminish the harsh impact of technological progress.<\/p>\n<p><strong>The CIA Triad- how might it reverberate trust and privacy?<\/strong><\/p>\n<p>The CIA Triad, or Confidentiality, Integrity, and Availability Triad is a device that, thanks to its strict rules, allows the control of information security policies. The first component of the triad is confidentiality. Confidentiality consists of restraining unauthorized people from accessing classified data. The next component of the CIA, or AIC Triad, is integrity. This point makes sure that the data\u2019s coherence is maintained in its initial state for the organization\u2019s safety purposes and credibility. Lastly, we have availability. This last component of the triad ensures that authorized employers have access to all kinds of data they need at all times. To make this possible, authentication mechanisms and systems must work correctly and be frequently updated. \u00a0Like the CSO article discusses, the CIA Triad doesn\u2019t have a single creator. Vice president at cybersecurity firm Dragos, Ben Miller, thinks that one of the three concepts of the CIA Triad (confidentiality), was officially intorduced in 1976 in a study done by the US Air Force. The triangle then presents integrity, another key concept of the triad laid out in 1987 on a paper. This paper talked about the importance of data accuracy. Lastly, the final concept that closes the triangle is availability. A concept mentioned in 1988 when the Morris Worm, named after the creator (Robert Tappan Morris), infected many computers, becoming one of the first malaware in history to have caused computers inoperability. Finally, the triad was established in 1998 as the CIA Traid. Despite being so efficient, the CIA Triad might reverberate trust and privacy because trying to maintain the right balance between the destruction of privacy through centralized programs and keeping discrection among people is a very difficult accomplishment.<\/p>\n<p><strong>The NIST Framework principles<\/strong><\/p>\n<p>The NIST, or National Institute of Standards and Technology Framework, offers a great technique to combat risks in the cybersecurity field by providing different policies that organizations can benefit from. The NIST framework, follows five different functions that contribute to the improvement of security and cybercrime avoidance:<\/p>\n<ul>\n<li>The first function is Identifying. This helps organizations to have a clearer idea about which processes need to be protected.<\/li>\n<li>The second function is Protecting. Protection, is fundamental to keep an organization safe.<\/li>\n<li>The third function is detecting. With this function, we are able to detect a potential cyberattack beforehand and keep it from happening.<\/li>\n<li>The fourth function is Responding. Once we\u2019ve identified the attack, we need to respond by limiting the damage and informing everyone within the company about the problem.<\/li>\n<li>Lastly, the fifth and last function is Recovering. This function has the task to restore any capabilities or services that were impaired due to a cybersecurity event. The aim of this last function is to avoid the attack from happening again.<\/li>\n<\/ul>\n<p>The NIST framework has many benefits. (4) The framework protects all kinds of businesses from threats. The goal with the NIST is to improve cybersecurity efforts and develop a common language to \u00a0understanding, describing, and managing cybersecurity risks. Making it easier for employees to defend themselves and the company from any risks. The framework impacts greatly on the social meaning of cybersecurity-related measures because it makes people aware of potential risks and therefore shows the importance of information protection,\u00a0 allows inclusivity among different organization sizes, and gives a company the possibility to show their commitment and reliability. By doing this, business partners and customers feel safer working with a specific company.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>(5) To conclude, all the cybersecurity-related technical systems mentioned in the paper, like the SCADA, the CIA Triad, and the NIST framework, play a fundamental role in providing secure data and information systems as well as secure infrastructure. Moreover, the use of such systems helps diminish the likelihood of threats, the protection of privacy, and the credibility of the company.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Sources:<\/p>\n<p><em>What is the NIST Cybersecurity Framework?<\/em>. IBM. (n.d.). <a href=\"https:\/\/www.ibm.com\/topics\/nist\">https:\/\/www.ibm.com\/topics\/nist<\/a><\/p>\n<p>Hashemi-Pour, C., &amp; Chai, W. (2023, December 21). <em>What is the CIA triad?: Definition from TechTarget<\/em>. WhatIs. <a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA\">https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<\/a><\/p>\n<p><em>The CIA triad: Definition, components and examples<\/em>. CSO Online. (2020, February 10). <a href=\"https:\/\/www.csoonline.com\/article\/568917\/the-cia-triad-definition-components-and-examples.html\">https:\/\/www.csoonline.com\/article\/568917\/the-cia-triad-definition-components-and-examples.html<\/a><\/p>\n<p><em>One flaw too many: Vulnerabilities in SCADA systems<\/em>. Security News. (n.d.). <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/one-flaw-too-many-vulnerabilities-in-scada-systems\">https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/one-flaw-too-many-vulnerabilities-in-scada-systems<\/a><\/p>\n<p><em>What is SCADA? Supervisory Control and Data Acquisition<\/em>. Inductive Automation. (n.d.). <a href=\"https:\/\/inductiveautomation.com\/resources\/article\/what-is-scada\">https:\/\/inductiveautomation.com\/resources\/article\/what-is-scada<\/a><\/p>\n<p><em>SCADA systems<\/em>. SCADA Systems. (n.d.). <a href=\"https:\/\/www.scadasystems.net\/\">https:\/\/www.scadasystems.net\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Social Meaning and Impact of Cybersecurity-related Technical Systems Cybersecurity-related technical systems like the CIA Triad, SCADA Systems, and the NIST Framework play a significant role in today\u2019s society because they protect companies, infrastructure, and all kinds of digital systems&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cbelf001\/cyse-301\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28443,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/users\/28443"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":320,"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/pages\/123\/revisions\/320"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cbelf001\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}