CIA

In cybersecurity, one of the first ideas we learn about is the CIA Triad, which stands forConfidentiality, Integrity, and Availability. Even though it sounds simple, this model is thefoundation for protecting data or information. Confidentiality is comes down to keeping dataprivate and making sure only the right people have access to it. Tools like encryption, strongpasswords, and multi factor authentication work together to block out anyone who should nothave access (Chai, 2022). Integrity focuses on the accuracy of information. Data needs to stayreliable from the moment it is created to the moment it is used, and that means protecting it fromhaving inaccuracies. Tampering also affects data integrity, which is why strong access controlplays such a big role in its protection. Version control, file permissions, and checksums are alsocommon ways to guard data integrity (Chai, 2022). Lastly, availability makes sure that systemsand data are there when people need them. Backups, redundant servers, and disaster recoveryplans all exist so organizations can keep running in the event something might go wrong (Chai,2022).The CIA Triad helps set the standard, but authentication and authorization are the processes thatenforce these standards. Authentication is how a system checks who you are, whether it is with apassword, a multi factor token, or a fingerprint. Authorization comes next and will decide whatyou are allowed to do. Logging into a bank account is a good example. Authentication provesyour identity, while authorization sets the rules for what actions you can take, like viewing yourbalances or transferring money.Authentication and authorization work together to create a balance of trust and control. Theyhelp ensure that our information stays protected while still allowing access to users. Withoutthem, it will be extremely difficult to know who or what is accessing information and if theyhave the right to access it.ReferenceChai, W. (2022, June 28). What is the CIA Triad? Definition, Explanation, Examples.TechTarget. https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA

SCADA

Supervisory Control and Data Acquisition systems, also known as SCADA, are the backbone ofmany industries that help keep society to function. They control and monitor things like powerplants, water treatment facilities, and manufacturing lines. Throughout the years, these systemshave went from being air gapped to being connected to the internet. While these changes madeoperations faster and easier to manage, it also opens the door to potential cyber threats. A hackerthat gains access to these systems could cause power outages, interrupt water flow, or damageequipment that entire communities rely on. They can do a lot of harm to infrastructure and canultimately have a big impact on day to day society functions.The Cybersecurity and Infrastructure Security Agency or CISA explains that manyvulnerabilities come from old software, poor password management, and a lack of networkseparation between secure and public systems (CISA, 2024). Many times, attackers use phishingemails or malware to reach control devices that were never meant to be exposed online.To reduce these vulnerabilities, modern SCADA applications use multiple layers of protection.Firewalls, access controls, and VPNs help limit who and what can connect to these systems.Redundant servers and constant monitoring also make sure that operations continue running inthe event that something goes wrong. To summarize, SCADA not only keeps machines runningbut also plays a major role in keeping critical cyber infrastructure safe and reliable.ReferencesSCADA Systems. (n.d.). Supervisory Control and Data Acquisition. Retrieved fromhttp://www.scadasystems.netCybersecurity and Infrastructure Security Agency (CISA). (2024). Defending Industrial ControlSystems. Retrieved from https://www.cisa.gov
Feeding the Machine: How Our Digital Behavior Trains the Technology That Shapes Us
1. Attention as CurrencyI used to think I was just scrolling through social media to kill time. I would checkYouTube Shorts before bed, watch a few clips, maybe laugh at something dumb, and then closethe app. It felt like nothing. Just me using my phone like everybody else. But when I startedpaying attention I realized these small habits are basically lessons I am teaching the platform.Every time I like something, pause on a video, or open an app when I am bored, I am telling thesystem what I respond to. I am not just looking at content. I am helping it understand who I am,or at least who I look like based on what I click. Researchers have shown that platforms do notsimply show content, they continuously test and improve their recommendations based on userinteractions and social feedback loops (Metzler & Garcia, 2023).2. How Our Habits Become DataThe weird part is that none of this feels like giving up data. Nobody is stealing it fromme. I post pictures and react to other posts without thinking about how all those actions aretracked. The system does not care what I claim to like. It cares how long I stare at something. If Iscroll past a hundred posts but stop on one, that is the one that matters. If I click fitness stuff acouple of times, the app will start throwing gym content at me like I subscribed to it. I do notneed to fill out a personality quiz. My habits are the quiz. Research on social media addictionand “problematic use” shows that it is the repeated engagement, patterns of use, and time spent
that shape how platforms respond to us and how our online behavior evolves over time(Pellegrino et al., 2022).3. When the Machine Starts Responding to UsEventually the platform starts shaping me back. I do not just get content I like. I getcontent that keeps me engaged. If I stop on a basketball highlight, I get more. And then more.Soon the feed believes I only care about sports or training or hustle clips. The app does not say“here is a balanced look at the world.” It says “this kept your eyes peeled for 12 seconds, so hereare 40 more things just like it.” That is how it becomes a loop. I feed the machine, the machinefeeds me, and I keep clicking because it feels familiar and safe. I start to think the internet is builtaround the things I react to the most. The more emotional the reaction, the harder it is to breakthe cycle, which is why researchers have compared heavy social media use and algorithm drivenengagement to addictive behavior with real effects on the brain and mental health (De et al.,2025).4. Where Cyber Security Falls ShortThis is where cyber security feels incomplete. Cyber security usually protects passwords,blocks hackers, or prevents identity theft. All of that matters. But none of those defenses stopplatforms from studying us. There is no firewall against my own curiosity. There is no antivirusfor habits. The threat is not someone breaking into my account. The threat is me willingly givingaway the information that trains the system. It learns when I am bored, when I am lonely, when Iam upset, and when I am most likely to scroll. It does not need malware to get all that. It onlyneeds me to keep using it.
5. Performing for the AlgorithmI also see how this affects people socially. We think we are expressing ourselves. Wepost opinions, jokes, gym updates, political takes, random thoughts, and some of it is harmless.But some of it becomes identity. We start chasing reactions because likes and views feel likeproof we matter. Online, attention becomes validation. The machine rewards us for feeding it, sowe keep feeding it. It does not feel forced. It feels like being honest, even when the version of“honest” we are projecting is shaped by what gets engagement.6. Invisible ExperimentsThe scariest part to me is how invisible it is. Most people have no idea the app is testingthem constantly. It shows you something extreme just to see if you pause. If you do, the systemlogs it and now it knows what triggers you. You never see the experiment. You only see themenu of recommendations afterward. I used to think I was choosing what I wanted, but now Irealize I am usually choosing from what the system already decided to show me. And yeah,sometimes I still fall for it. Sometimes I watch nonsense I do not even care about, just because itshowed up at the right moment when I was tired.7. Awareness Is Our Only DefenseI still use some social media. I enjoy seeing new ideas and staying in contact with people.I do not think quitting is realistic for most people. But I try to be more aware of what I am givingthe system. If I click something, I ask myself if I really care or if I am just reacting. Sometimes Iclose the app instead of letting it decide what I want next. I am not perfect at this. I probablynever will be. But the more I feed the machine, the better it becomes at shaping me. It is alwayslistening. The only real choice I have is how much I want to keep teaching it.
ReferencesDe, D., El Jamal, M., Aydemir, E., & Khera, A. (2025). Social media algorithms and teenaddiction: Neurophysiological impact and ethical considerations. Cureus, 17(1), e77145.https://pmc.ncbi.nlm.nih.gov/articles/PMC11804976/Metzler, H., & Garcia, D. (2023). Social drivers and algorithmic mechanisms on digital media.Perspectives on Psychological Science, 19(5), 735–748.https://pmc.ncbi.nlm.nih.gov/articles/PMC11373151/Pellegrino, A., Stasi, A., & Bhatiasevi, V. (2022). Research trends in social media addiction andproblematic social media use: A bibliometric analysis. Frontiers in Psychiatry, 13, 1017506.https://pmc.ncbi.nlm.nih.gov/articles/PMC9707397