IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,  and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.

Be sure to remove this instructional language when you have completed updating content on this page.


Write Up – CIA Triad

The CIA Triad, Authentication, and Authorization

What is the CIA Triad? 

The CIA Triad is a model designed to protect policies in an organization. It stands for Confidentiality, Integrity and Availability. According to an article describing the CIA Triad, It is often referred to as the “AIC Triad” to avoid confusion with the Central Intelligence Agency (Chai). It is a fundamental part of Information security and cybersecurity. The three principles the CIA Triad represents, ensures that an organization’s data is protected and reliable through authentication and authorization. 

The Three Principles

Confidentiality – which essentially means privacy – is the first principle of the CIA Triad It ensures that no unauthorized users are able to gain data. According to Wesley Chai, “It is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands” (Chai). While this practice is not required, it allows for a better understanding of what the most important pieces of data to protect are, and what could happen as a result of them failing to be properly protected. 

Integrity is the second principle of the CIA Triad. Integrity means maintaining the accuracy and consistency of data over its life cycle. It is common knowledge that “Data can not be altered in transit” (Chai). Unauthorized users are unable to change the data of a file. The integrity of a file ensures that none of its contents were tampered with or modified by an unauthorized user. Checksums and hashing is often used to detect any changes in data. 

Availability is the final principle. Information should have the ability to be accessed at any point by authorized users. This requires a stable and reliable network, backups of data in case of a breach or accidental loss of data, and maintaining software and hardware to ensure they are in good condition and up to date. If a breach occurs, and data is lost, there can be major setbacks for an organization. 

Authentication or Authorization?

It is relatively common for people to get authentication and authorization confused, but they are two different security measures which cooperate to ensure the security of data in an organization or platform. Authentication makes sure that you are who you say you are, and Authorization checks if you are allowed to access data. When you log into a website, you must enter a username and password, to show that you are authorized to gain access to the website and its data. Once it is confirmed that you are authorized, authentication checks your identity. You may be sent an email or text to verify that it is you trying to log in. This is an example of Multi-Factor Authentication (MFA). This ensures that it is really you trying to log in, rather than someone else using your account or credentials. 

Conclusion

The CIA Triad, authentication and authorization are all extremely important to information security, cybersecurity and  the protection and accuracy of data. They collaborate to confirm data is private, accurate and easy to access, while only giving authorized users access to the data. When trying to gain access to data, authorization comes first, and authentication comes next. Together they maintain and uphold the CIA triad. They ensure data is confidential, accurate, and easy to access when needed. 

References

Hashemi-Pour, Cameron, and Wesley Chai. “What Is the CIA Triad?: Definition from TechTarget.” WhatIs, TechTarget, 21 Dec. 2023, www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA. 

Write-Up: SCADA Systems

SCADA Systems

What are SCADA systems?

SCADA stands for Supervisory Control and Data Acquisition. These refer to ICS (Industrial Control Systems) used to control various infrastructure processes. These processes include wastewater, agricultural, wind farms, and more. It gathers real time data and transfers it to a central location for analysis. According to an article explaining SCADA systems, “SCADA systems are crucial for industrial organizations since they help to maintain efficiency, process data for smarter decisions, and communicate system issues to help mitigate downtime” (Inductive Automation).

Vulnerabilities associated with critical infrastructure

Many people believe that SCADA systems are already very safe, considering they are not connected to the internet, but this is not exactly true. Due to what these systems monitor, threats should be taken extremely seriously. They are often prime targets for cybercrime.  If the systems were to get destroyed, it would cause a very large problem. According to an article, These systems control systems like traffic lights and how electricity is transmitted, as well as gas pipelines and oil transportation. (Scadasystems.net). These systems are often interconnected to one another meaning the destruction of one, could harm another system, or multiple other systems. An article explaining the vulnerabilities of SCADA systems mentions that, “Vulnerabilities can oftentimes be found in the Human Machine Interface part of SCADA systems. Because of its capabilities and role in SCADA systems, HMIs can be an ideal target for potential threat actors aiming to gain control over processes or steal critical information” (One Flaw Too Many). This however is not the only vulnerable part of these systems, and attacks are also prevalent in mobile applications or web interfaces. 

SCADA Applications role in Mitigating Risk

SCADA systems mitigate risk through several different measures. Many risks to critical infrastructure are reduced through real time monitoring, control and acquisition of data. Physically secure SCADA systems have security cameras, and various access control points, to keep unauthorized people from accessing or modifying these systems. These characteristics aid in making sure that infrastructure is robust and operational even in the face of possible dangers, such as cyberattacks, natural catastrophes, or human errors.

Conclusion

SCADA systems are essential to the management and operation of critical infrastructure because they offer real-time data collection, control, and monitoring to guarantee effectiveness and minimize downtime. However, because of their crucial function in managing vital activities like power grids and transportation networks, it is as if they have a giant target on their back. They are extremely popular targets of cyber attacks. Critical infrastructure is interconnected, which increases the possible impact of a breach. By combining physical security measures, safe access restrictions, and real-time monitoring, SCADA programs can reduce these threats. These precautions are essential for maintaining the resilience and dependability of vital infrastructure by guarding against human mistake, natural disasters, and cyberattacks.

References

One flaw too many: Vulnerabilities in SCADA systems. Trend Micro (US). (n.d.). https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/one-flaw-too-many-vulnerabilities-in-scada-systems 

Write Up: Human Factor in Cybersecurity

Allocation of Limited Funds for Cybersecurity

Human Factors in Cybersecurity

Human Factors refers to the roles that individuals or groups play in cybersecurity. This could mean how competent someone’s cybersecurity skills are, or how likely it is for someone to create or expose vulnerabilities. With humans being behind some cybercrimes, such as phishing scams, human factors need to be considered inside and outside of the business. 

Balancing the tradeoff

Balancing the tradeoff of training and additional cybersecurity technologies and measures is a crucial decision for any business. It is a choice that can either make or break any organization, due to the harsh reality of cybersecurity. It requires careful consideration of what the organization needs, what its vulnerabilities are and what its cybersecurity goals are. 

Amount of budget into training

Training costs can be relatively low if you focus only on what is probable or necessary. People are a huge part of cybersecurity, and properly trained employees can help to significantly reduce or completely prevent cybersecurity incidents. Human error is the leading cause of security breaches such as weak password usage or phishing attacks. Proper training regarding cybersecurity safe practices would reduce the likelihood of human error causing these breaches, reducing the risk that the organization faces. The training should focus on phishing attempts, stronger passwords, and the use of multi factor authentication. 

Budget for cybersecurity technology

I feel that more needs to be spent on tech, considering how cheap training can be. While people are the leading cause of security breaches, new technologies can make it easier for employees to defend against or detect attempts at security breaches or other forms of cyber attacks. These funds could go into updated antivirus software, firewall protection, encryption tools, or backups of data on a different system, or even offline. Money would be better spent on basic, high impact and highly reliable technology then the newest, and significantly more expensive technology. 

Conclusion

Human factors in cyber security are extremely important to the safety of an organization. Human error is the leading cause of data and security breaches so enough money needs to go towards properly training employees on how to look for scams and phishing attempts as well as things such as stronger passwords and password management. What’s left could go towards additional technology. Rather than top of the line tech, getting basic but highly effective tools can improve usability, and reduce cost, allowing for more money to be spent elsewhere wherever it is needed. The budget should be focused on well rounded cybersecurity practices. This allows the proper optimization of a limited budget, regardless of the specific amount. 

CYSE-200T Analytical Paper

An Analytical Look at The CIA Triad and SCADA Systems

Introduction

I believe that the CIA Triad and the SCADA (Supervisory Control and Data Acquisition) systems must cooperate to build the greatest reliability possible, regarding both organizations and critical infrastructure. Confidentiality, integrity, and availability are crucial to cybersecurity as a whole, which includes SCADA systems. While the CIA Triad focuses on the general aspects of cybersecurity in any situation, I feel that SCADA systems would be best protected using both their practices, in combination with the core principles of the CIA Triad. This allows for a more comprehensive plan to protect critical systems. The vulnerabilities found within SCADA systems and critical infrastructure stress the importance of adhering to the CIA Triad. Due to the importance of these systems in our society and everyday life, they need to have as much protection from failure or damage as possible. 

What is the CIA Triad? 

The CIA Triad is a model designed to protect policies in an organization. It stands for Confidentiality, Integrity, and Availability. According to an article describing the CIA Triad, it is often called the “AIC Triad” to avoid confusion with the Central Intelligence Agency (Chai). It is a fundamental part of Information security and cybersecurity. The three principles of the CIA Triad ensure that an organization’s data is protected and reliable through authentication and authorization. 

The Three Principles

Confidentiality – essentially privacy – is the first principle of the CIA Triad. It ensures that no unauthorized users can gain data. According to Wesley Chai, “It is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands” (Chai). While this practice is not required, it allows for a better understanding of what the most critical pieces of data to protect are and what could happen as a result of them failing to be properly protected. 

Integrity is the second principle of the CIA Triad. Integrity means maintaining the accuracy and consistency of data over its life cycle. It is common knowledge that “Data can not be altered in transit” (Chai). Unauthorized users are unable to change the data of a file. The integrity of a file ensures that none of its contents have been tampered with or modified by an unauthorized user. Checksums and hashing are often used to detect any changes in data. 

Availability is the final principle. Information should have the ability to be accessed at any point by authorized users. This requires a stable and reliable network, backups of data in case of a breach or accidental loss of data, and maintaining software and hardware to ensure they are in good condition and up to date. If a breach occurs and data is lost, there can be major setbacks for an organization. 

Authentication or Authorization?

It is relatively common for people to get authentication and authorization confused, but they are two different security measures that cooperate to ensure the security of data in an organization or platform. Authentication makes sure that you are who you say you are, and Authorization checks if you are allowed to access data. When you log into a website, you must enter a username and password to show that you are authorized to gain access to the website and its data. Once it is confirmed that you are authorized, authentication checks your identity. You may be sent an email or text to verify that it is you trying to log in. This is an example of Multi-Factor Authentication (MFA). This ensures that it is you trying to log in, rather than someone else using your account or credentials. 

CIA Triad and SCADA Systems

The CIA Triad forms the foundation of cybersecurity practices and is crucial for protecting critical infrastructure, similarly to SCADA (Supervisory Control and Data Acquisition) systems. SCADA systems are used to monitor real time devices and sensors, which allows the operators to manage and automate processes and operations from a central area. They monitor and control crucial areas such as water-treatment systems and electrical distribution. Confidentiality keeps any unauthorized person from gaining access to data they aren’t supposed to, while Integrity ensures that all data collected and currently stored avoids tampering. Availability in critical infrastructure is crucial, as any failure could lead to massive power outages or delays in some forms of public transportation, such as subways. All of the principles of the CIA Triad are connected to SCADA and the protection of critical infrastructure. The vulnerabilities often found in SCADA systems, which are often found in the HMI (Human Machine Interface), show the importance of sticking to the principles of confidentiality, integrity, and availability. This is essentially for the reliability of critical infrastructure.

What are SCADA systems?

SCADA stands for Supervisory Control and Data Acquisition. These refer to ICS (Industrial Control Systems) used to control various infrastructure processes. These processes include wastewater, agricultural, wind farms, and more. It gathers real-time data and transfers it to a central location for analysis. According to an article explaining SCADA systems, “SCADA systems are crucial for industrial organizations since they help to maintain efficiency, process data for smarter decisions, and communicate system issues to help mitigate downtime” (Inductive Automation). 

Vulnerabilities associated with critical infrastructure

Many people believe that SCADA systems are already very safe, considering they are not connected to the internet, but this is not exactly true. Due to what these systems monitor, threats should be taken extremely seriously. They are often prime targets for cybercrime.  If the systems were to get destroyed, it would cause a very large problem. According to an article, these systems control systems like traffic lights and how electricity is transmitted, as well as gas pipelines and oil transportation. (Scadasystems.net). These systems are often interconnected, meaning that the destruction of one could harm another system or multiple systems. An article explaining the vulnerabilities of SCADA systems mentions that, “Vulnerabilities can oftentimes be found in the Human Machine Interface part of SCADA systems. Because of its capabilities and role in SCADA systems, HMIs can be an ideal target for potential threat actors aiming to gain control over processes or steal critical information” (One Flaw Too Many). This, however, is not the only vulnerable part of these systems, and attacks are also prevalent in mobile applications or web interfaces. 

SCADA Applications’ Role in Mitigating Risk

SCADA systems mitigate risk through several different measures. Many risks to critical infrastructure are reduced through real-time monitoring, control, and acquisition of data. Physically secure SCADA systems have security cameras and various access control points to keep unauthorized people from accessing or modifying these systems. These characteristics aid in making sure that infrastructure is robust and operational even in the face of possible dangers, such as cyberattacks, natural disasters, or human errors.

Concluding Analysis

I feel the integration of the CIA triad and SCADA systems allows the most comprehensive protection for critical infrastructure. SCADA systems are mostly focused on monitoring and managing critical infrastructure, while the CIA triad refers to a strong cybersecurity framework. Cybersecurity is constantly growing as a field. Plans and policies will need to constantly be updated to keep up with the changes due to new technology or new threats. The reliability of the principles of confidentiality, integrity, and availability rarely falters. Of course, no policy present can accurately predict or foresee a cyberattack, and policies must be consistently updated to ensure effectiveness. There are, however, ways to mitigate the damages if one does occur, and ways to lower the risk of one happening. SCADA systems and the CIA triad must work together to ensure the safety of our critical infrastructure and reduce the risks of damage or failure.  

References

Hashemi-Pour, Cameron, and Wesley Chai. “What Is the CIA Triad?: Definition from TechTarget.” WhatIs, TechTarget, 21 Dec. 2023, www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA. 

One flaw too many: Vulnerabilities in SCADA systems. Trend Micro (US). (n.d.). https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/one-flaw-too-many-vulnerabilities-in-scada-systems 

What is SCADA? Supervisory Control and Data Acquisition. Inductive Automation. (n.d.). https://inductiveautomation.com/resources/article/what-is-scada