Course Reflection

CYSE 270 I learned a lot about Linux during the CYSE 270 course. As I had no prior Linux experience during the course, I acquired a plethora of new knowledge about system commands, permission management, storage management, shell scripting, and even some networking commands. This course helped me develop fundamental skills for Linux systems and…

CYSE 270 Labs

Lab 1 Reflection In this first lab for CYSE 270, students were tasked with setting up their virtual machines and running a few rudimentary commands. While I had already set up a Windows based virtual machine using Virtual Box over the summer, this assignment served as my first indroduction to working in Linux machines. Overall…

Write-Up – SCADA Systems

Demetrius EvansCYSE 200TMarch 30thProfessor Duvall SCADA Systems BLUF: SCADA systems are used in many different industries today including criticalinfrastructure. These systems, while useful, can be major cybersecurity risks if the proper security measures aren’t considered. What is SCADA? SCADA systems, also known as Supervisory Control and Data Acquisition, are industrial control systems used to manage…

Write-Up: The CIA Triad

Demetrius EvansCYSE 200TFebruary 16th 2025Professor Duvall The CIA Triad, Authentication, and Authorization BLUF: The CIA (Confidentiality, Availability, Integrity) Triad is a checklist for I.T workers that creates better security. The Triad The C in the CIA triad stands for confidentiality, which means privacy of the data in company (Chai, 2022). Confidentiality is about securing data…