Artifacts
CIA
In cybersecurity, one of the first ideas we learn about is the CIA Triad, which stands for
Confidentiality, Integrity, and Availability. Even though it sounds simple, this model is the
foundation for protecting data or information. Confidentiality is comes down to keeping data
private and making sure only the right people have access to it. Tools like encryption, strong
passwords, and multi factor authentication work together to block out anyone who should not
have access (Chai, 2022). Integrity focuses on the accuracy of information. Data needs to stay
reliable from the moment it is created to the moment it is used, and that means protecting it from
having inaccuracies. Tampering also affects data integrity, which is why strong access control
plays such a big role in its protection. Version control, file permissions, and checksums are also
common ways to guard data integrity (Chai, 2022). Lastly, availability makes sure that systems
and data are there when people need them. Backups, redundant servers, and disaster recovery
plans all exist so organizations can keep running in the event something might go wrong (Chai,
2022).
The CIA Triad helps set the standard, but authentication and authorization are the processes that
enforce these standards. Authentication is how a system checks who you are, whether it is with a
password, a multi factor token, or a fingerprint. Authorization comes next and will decide what
you are allowed to do. Logging into a bank account is a good example. Authentication proves
your identity, while authorization sets the rules for what actions you can take, like viewing your
balances or transferring money.
Authentication and authorization work together to create a balance of trust and control. They
help ensure that our information stays protected while still allowing access to users. Without
them, it will be extremely difficult to know who or what is accessing information and if they
have the right to access it.
Reference
Chai, W. (2022, June 28). What is the CIA Triad? Definition, Explanation, Examples.
TechTarget. https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-
availability-CIA
SCADA
many industries that help keep society to function. They control and monitor things like power
plants, water treatment facilities, and manufacturing lines. Throughout the years, these systems
have went from being air gapped to being connected to the internet. While these changes made
operations faster and easier to manage, it also opens the door to potential cyber threats. A hacker
that gains access to these systems could cause power outages, interrupt water flow, or damage
equipment that entire communities rely on. They can do a lot of harm to infrastructure and can
ultimately have a big impact on day to day society functions.
The Cybersecurity and Infrastructure Security Agency or CISA explains that many
vulnerabilities come from old software, poor password management, and a lack of network
separation between secure and public systems (CISA, 2024). Many times, attackers use phishing
emails or malware to reach control devices that were never meant to be exposed online.
To reduce these vulnerabilities, modern SCADA applications use multiple layers of protection.
Firewalls, access controls, and VPNs help limit who and what can connect to these systems.
Redundant servers and constant monitoring also make sure that operations continue running in
the event that something goes wrong. To summarize, SCADA not only keeps machines running
but also plays a major role in keeping critical cyber infrastructure safe and reliable.
References
SCADA Systems. (n.d.). Supervisory Control and Data Acquisition. Retrieved from
http://www.scadasystems.net
Cybersecurity and Infrastructure Security Agency (CISA). (2024). Defending Industrial Control
Systems. Retrieved from https://www.cisa.gov
1. Attention as Currency
I used to think I was just scrolling through social media to kill time. I would check
YouTube Shorts before bed, watch a few clips, maybe laugh at something dumb, and then close
the app. It felt like nothing. Just me using my phone like everybody else. But when I started
paying attention I realized these small habits are basically lessons I am teaching the platform.
Every time I like something, pause on a video, or open an app when I am bored, I am telling the
system what I respond to. I am not just looking at content. I am helping it understand who I am,
or at least who I look like based on what I click. Researchers have shown that platforms do not
simply show content, they continuously test and improve their recommendations based on user
interactions and social feedback loops (Metzler & Garcia, 2023).
2. How Our Habits Become Data
The weird part is that none of this feels like giving up data. Nobody is stealing it from
me. I post pictures and react to other posts without thinking about how all those actions are
tracked. The system does not care what I claim to like. It cares how long I stare at something. If I
scroll past a hundred posts but stop on one, that is the one that matters. If I click fitness stuff a
couple of times, the app will start throwing gym content at me like I subscribed to it. I do not
need to fill out a personality quiz. My habits are the quiz. Research on social media addiction
and “problematic use” shows that it is the repeated engagement, patterns of use, and time spent
(Pellegrino et al., 2022).
3. When the Machine Starts Responding to Us
Eventually the platform starts shaping me back. I do not just get content I like. I get
content that keeps me engaged. If I stop on a basketball highlight, I get more. And then more.
Soon the feed believes I only care about sports or training or hustle clips. The app does not say
“here is a balanced look at the world.” It says “this kept your eyes peeled for 12 seconds, so here
are 40 more things just like it.” That is how it becomes a loop. I feed the machine, the machine
feeds me, and I keep clicking because it feels familiar and safe. I start to think the internet is built
around the things I react to the most. The more emotional the reaction, the harder it is to break
the cycle, which is why researchers have compared heavy social media use and algorithm driven
engagement to addictive behavior with real effects on the brain and mental health (De et al.,
2025).
4. Where Cyber Security Falls Short
This is where cyber security feels incomplete. Cyber security usually protects passwords,
blocks hackers, or prevents identity theft. All of that matters. But none of those defenses stop
platforms from studying us. There is no firewall against my own curiosity. There is no antivirus
for habits. The threat is not someone breaking into my account. The threat is me willingly giving
away the information that trains the system. It learns when I am bored, when I am lonely, when I
am upset, and when I am most likely to scroll. It does not need malware to get all that. It only
needs me to keep using it.
I also see how this affects people socially. We think we are expressing ourselves. We
post opinions, jokes, gym updates, political takes, random thoughts, and some of it is harmless.
But some of it becomes identity. We start chasing reactions because likes and views feel like
proof we matter. Online, attention becomes validation. The machine rewards us for feeding it, so
we keep feeding it. It does not feel forced. It feels like being honest, even when the version of
“honest” we are projecting is shaped by what gets engagement.
6. Invisible Experiments
The scariest part to me is how invisible it is. Most people have no idea the app is testing
them constantly. It shows you something extreme just to see if you pause. If you do, the system
logs it and now it knows what triggers you. You never see the experiment. You only see the
menu of recommendations afterward. I used to think I was choosing what I wanted, but now I
realize I am usually choosing from what the system already decided to show me. And yeah,
sometimes I still fall for it. Sometimes I watch nonsense I do not even care about, just because it
showed up at the right moment when I was tired.
7. Awareness Is Our Only Defense
I still use some social media. I enjoy seeing new ideas and staying in contact with people.
I do not think quitting is realistic for most people. But I try to be more aware of what I am giving
the system. If I click something, I ask myself if I really care or if I am just reacting. Sometimes I
close the app instead of letting it decide what I want next. I am not perfect at this. I probably
never will be. But the more I feed the machine, the better it becomes at shaping me. It is always
listening. The only real choice I have is how much I want to keep teaching it.
De, D., El Jamal, M., Aydemir, E., & Khera, A. (2025). Social media algorithms and teen
addiction: Neurophysiological impact and ethical considerations. Cureus, 17(1), e77145.
https://pmc.ncbi.nlm.nih.gov/articles/PMC11804976/
Metzler, H., & Garcia, D. (2023). Social drivers and algorithmic mechanisms on digital media.
Perspectives on Psychological Science, 19(5), 735–748.
https://pmc.ncbi.nlm.nih.gov/articles/PMC11373151/
Pellegrino, A., Stasi, A., & Bhatiasevi, V. (2022). Research trends in social media addiction and
problematic social media use: A bibliometric analysis. Frontiers in Psychiatry, 13, 1017506.
https://pmc.ncbi.nlm.nih.gov/articles/PMC9707397
