{"id":359,"date":"2025-06-26T19:14:31","date_gmt":"2025-06-26T19:14:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cjone132\/?p=359"},"modified":"2025-06-26T19:14:33","modified_gmt":"2025-06-26T19:14:33","slug":"analysis-of-the-social-meaning-and-impactof-cybersecurity-systems","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cjone132\/2025\/06\/26\/analysis-of-the-social-meaning-and-impactof-cybersecurity-systems\/","title":{"rendered":"Analysis of the social meaning and impactof cybersecurity systems"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><br><\/p>\n\n\n\n<p>Before considering how cybersecurity systems bring meaning to our social interactions<br>and their value within technological environments, it would first be valuable to discuss some of<br>their guiding principles to better attain an understanding of them. The CIA Triad lays some of<br>the groundwork for a foundational understanding of cybersecurity professionals and their goals.<br>Cybersecurity principles also play a vital role in assuring data is only accessed and modified by<br>those authorized to do so. Through training and building a proactive rather than reactive<br>cybersecurity approach, attacks which could impede business operations with immense financial<br>consequences, such as ransomware, can be avoided.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>The CIA Triad and Access Control principles<\/strong><\/p>\n\n\n\n<p><br>Sometimes referred to as the AIC to avoid confusion with the CIA Agency,<br>Accessibility, Integrity, and Confidentiality form the backbone of cybersecurity, ensuring<br>data is protected, accurate, and available only to those it should be in a timely manner.<br>Confidentiality are rules that limit access to information, Integrity assures that information<br>is trustworthy and accurate, while availability ensures reliable access to that information<br>but only to those allowed to access it (Chai, 2022). Each principle plays a vital role in<br>cybersecurity and can be elaborated further with specific examples.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Confidentiality<\/strong><\/p>\n\n\n\n<p><br>Users who have access to particularly sensitive data should receive extra training<br>on the risks involved with handling that data as well as methods to safeguard against the<br>risks. Confidentiality also suggests that users who are in such a position should be trained<br>on the best practices of passwords such as using a strong password, not sharing it or<br>writing it anywhere it could be found, as well as utilizing tools such as 2 Factor-Auth,<br>security tokens, or an \u201cair-gapped\u201d computer. Air gapped computer describes a pc that is<br>isolated from the network and other computers which are connected to the network<br>(Flinders, Smalley, 2025).<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Integrity<\/strong><\/p>\n\n\n\n<p><br>Imagine a hospital storing critical patient data on a secure server. Integrity plays a<br>vital role in ensuring this data remains accurate and unaltered, protecting it from both<br>human errors and external manipulations. At its core, digital data consists of 0s and 1s,<br>stored and processed using electrical charges within capacitors. However, this structure<br>makes it vulnerable to unintended alterations, such as those caused by electromagnetic<br>pulses, which can disrupt the integrity of stored information. Maintaining data of good<br>integrity means utilizing backup systems to provide redundancy such as version control,<br>checksums for verification, backups, and even \u201cdigital signatures for nonrepudiation<br>measures\u201d (Chai, 2022). This way data is backed up, and users are held accountable for<br>their actions within the environment.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Availability<\/strong><\/p>\n\n\n\n<p><br>What good would protecting and ensuring validation of data do if it were unavailable<br>to those who needed it most? To ensure availability of crucial data, it is essential that both<br>hardware and software systems be maintained on a regular schedule. Hardware should be<br>upkept to maintain a properly functioning operating system environment that is free of<br>software conflicts and provides proper bandwidth to prevent bottlenecks in<br>communication. In the worst-case scenario a plan must be in place to recover from an<br>attack and restore business operations. Some additional measures that could be taken<br>include utilizing RAID, failover, and other methods of redundancy. Monitoring systems<br>should be utilized so that a breach would be quickly discovered and an incident response<br>plan placed into action.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Access control<\/strong><\/p>\n\n\n\n<p><br>Unfortunately, society is chaotic and because of this cybersecurity efforts must be<br>made when building software that is going to involve storing sensitive data. I personally<br>tackled this cumbersome task with the last Android Application I constructed. In a<br>protected system, it&#8217;s important that anyone manipulating data is properly identified.<br>There are many methods of authentication, and most people online are exposed to them<br>on a regular interval including email\/password, 2 factor auth where it sends a text to your<br>phone, perhaps an application where you click \u201cYes\/No\u201d, or maybe the user has an SSH<br>key.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Authentication vs authorization<\/strong><\/p>\n\n\n\n<p><br>The idea of authentication is verifying who you are while authorization focuses on<br>what you are allowed to do within this environment. Everyone entering my application had<br>to be authenticated, and if they elected to utilize the \u201cContinue as a guest\u201d function that I<br>had, they were not authorized to post data to the database. This was essential to<br>protecting my resources as storing data on a server costs money and I only wanted<br>genuine users to create authentic content. Authorization was a very important concept<br>within that environment due to my integration of social media like features such as<br>messaging. I placed policies in my database rules that users could only delete their own<br>data that they created this way user 1 couldn\u2019t modify\/delete user 2\u2019s recipe they posted,<br>however as the server owner I could modify anyone&#8217;s data if necessary. I also allowed<br>groups to be formed, and groups could have moderators with control of all the posts within<br>that group. Authentication and later authorization would provide certain users with a<br>different GUI showing their escalated privileges.<\/p>\n\n\n\n<p><br>The CIA triad and access control principles are fundamental to<br>cybersecurity, ensuring data remains protected, accurate, and accessible only to<br>authorized users. By implementing strong authentication and authorization measures,<br>individuals and organizations can safeguard sensitive information from both internal<br>misuse and external threats. As demonstrated in my own application, proper security<br>protocols not only protect digital assets but also enhance user trust and system reliability.<br>In an increasingly digital connected world, understanding and applying these cybersecurity<br>principles is essential for maintaining secure and robust systems.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>The attack coming to eat Availability \u2013 Ransomware<\/strong><\/p>\n\n\n\n<p><br>Ransomware has teeth, and in the evolving landscape of cyber-security, few attacks pose<br>as serious a threat to availability as Ransomware. A form of malware that is specifically<br>designed to disrupt, damage, or obtain unauthorized access, ransomware is a type of<br>software that directly attacks an organization&#8217;s ability to operate. Attackers utilizing this<br>method don&#8217;t cast a wide net for a smash and grab style attack but rather research a<br>company and perform a methodical intrusion. Such attacks don&#8217;t just interrupt workflows;<br>they undermine the very trust that sustains organizations. In addition to being encrypted<br>out of its own data, an organization faces a potential chain reaction of severe<br>consequences including regulatory penalties, reputational damage, and the looming<br>threat of future breaches using stolen data.<\/p>\n\n\n\n<p><br>According to the Cybersecurity &amp; Infrastructure Security Agency\u2019s Ransomware Guide<br>(CISA, 2024), these attacks are increasingly \u201cstrategic, persistent, and financially<br>motivated,\u201d with modern variants employing double extortion, threatening both data loss<br>and public exposure. Similarly, Fortinet (2025) highlights that phishing emails, Remote<br>Desktop Protocol vulnerabilities, and software flaws remain primary vectors, underscoring<br>the need for layered defenses. The importance of monitoring and isolation of physical<br>hardware must also be stressed in this context for if an attacker was able to gain access to<br>the system, they could install it manually via download or even USB.<\/p>\n\n\n\n<p><br>Fortunately the risk can be mitigated though proper training and strict adherence to these<br>standards: Don\u2019t click suspicious links or attachments in emails from unknown senders;<br>these should be filtered and placed in spam as suspicious automatically. Endpoint<br>protection should be utilized that features monitoring of the behavior occurring on the<br>network. Patches should be applied regularly to maintain an up-to-date system. Unused<br>RDP ports should be secured and encrypted with 2FAuth. Lastly, all employees interacting<br>with the system should be trained in the risks associated with the consequences of<br>allowing a ransomware attack to occur. \u201cRansomware is more about manipulating<br>vulnerabilities in human psychology than the adversary&#8217;s technological sophistication.\u201d &#8211;<br>James Scott, Institute for Critical Infrastructure Technology.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Bringing it all together<\/strong><\/p>\n\n\n\n<p><br>Ultimately cybersecurity systems are not just technological structures but rather<br>pillars which build the foundation of our modern infrastructure and allow for the secure<br>exchange of information in a digital space. Beyond their technical function, cybersecurity<br>frameworks like the CIA Triad and access control mechanisms reflect and reinforce core<br>societal values like trust, accountability, privacy, and resilience. They shape how we<br>interact, how we govern, and how we protect our digital identities in an increasingly<br>interconnected world. As we continue to digitize every aspect of life, cybersecurity<br>becomes not only a defense mechanism, but a defining structure of social order and digital<br>citizenship.<\/p>\n\n\n\n<p><br><strong>Cited:<\/strong><\/p>\n\n\n\n<ul>\n<li>Cybersecurity &amp; Infrastructure Security Agency. (2024). Ransomware guide. U.S.<br>Department of Homeland Security. Retrieved from<\/li>\n\n\n\n<li>Fortinet. (2025). How to prevent ransomware. Retrieved from<br>Chai, W. (2022, June). What is the CIA Triad? Definition, Explanation, Examples.<br>Flinders, M., &amp; Smalley, I. (2025, April 17). What is an air gap?. IBM.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Before considering how cybersecurity systems bring meaning to our social interactionsand their value within technological environments, it would first be valuable to discuss some oftheir guiding principles to better attain an understanding of them. The CIA Triad lays some ofthe groundwork for a foundational understanding of cybersecurity professionals and their goals.Cybersecurity principles also play a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cjone132\/2025\/06\/26\/analysis-of-the-social-meaning-and-impactof-cybersecurity-systems\/\">Read More<\/a><\/div>\n","protected":false},"author":30951,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cjone132\/wp-json\/wp\/v2\/posts\/359"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cjone132\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cjone132\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cjone132\/wp-json\/wp\/v2\/users\/30951"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cjone132\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cjone132\/wp-json\/wp\/v2\/posts\/359\/revisions"}],"predecessor-version":[{"id":360,"href":"https:\/\/sites.wp.odu.edu\/cjone132\/wp-json\/wp\/v2\/posts\/359\/revisions\/360"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cjone132\/wp-json\/wp\/v2\/media?parent=359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cjone132\/wp-json\/wp\/v2\/categories?post=359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cjone132\/wp-json\/wp\/v2\/tags?post=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}