SCADA Systems Roles & Application 

SCADA Systems Roles & Application  In this article we will break down what critical infrastructure systems are. Next we will explain what supervisory control and data acquisition (SCADA) systems are. Finally we will explain the benefits of a SCADA system.  Critical Infrastructure Systems Think of your morning routine, for me after waking up I brush…

Breaking Down The CIA Triad And Differences Between Authentication & Authorization

According to Chai (2022), “Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. In this context, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is…

How Media Influences Our Understanding of Cybersecurity

Before watching the video I thought that they would negatively criticize how Hollywood would portray hacking but I was surprisingly wrong. The security analyst was very generous with her movie scores. The examples that were used in the clip were scenes from more recent movies and television shows. Nowadays I think because cyber security incidents…

Memes Vs Human Factors

Keeping employees aware of watering holes will help mitigate risk. Malware is placed on these websites that hacks know potential victims will access. This relates because no matter how secure the system is, all they need to do is acquire a users information This relates to the human factor because of how people may think…

Article Review

Revenge Porn Victimization of College Students: An Article Review Larry Le Department of Cybersecurity, Old Dominion University  CYSE 201S: Cybersecurity & Social Science Dr. Leigh Armistead October 1, 2023  Revenge Porn Victimization of College Students: An Article Review A study by Branch, Hilinski-Rosick, Johnson and Solano (2017) studied how technology has provided new opportunities for…

Fake V Real Websites

Today when I logged into my email I saw a notification about how my PayPal has been compromised. The thing was I actually never opened or created a PayPal in my life. I don’t know how but this year I have currently received more fake website advertisements than any other time in my life. I…

Ranking Motives For Hacking

I think motivation varies from person to person. I might like to wake up and the first thing that I do in the morning is run, someone else might wake up and look at their work emails. In this situation I prioritize my physical health and the other person prioritizes their job. There is no…

Maslow’s Hierarchy With Technology In Mind

According to the lecture, “Abraham Maslow’s hierarchy of needs suggest that all humans have needs that exist on the hierarchy. The theory suggests that as our lower-level needs are met, we begin to focus on meeting our upper-level needs”. The needs are broken up into separate categories from; physiological needs, safety needs, belongingness/love needs, esteem…

How Researchers Might Use PrivacyRights.org

Privacyrights.org/data-breaches was a tool that I didn’t even know existed until today. As stated on their about page, “Privacy Rights Clearinghouse is a nonprofit organization focused on increasing access to information, policy discussions and meaningful rights so that data privacy can be a reality for everyone”. They record data breaches from all the way back…

How The Principles Of Science Relate To Cybersecurity

Since I was a little my idea of science was just beakers and test tubes. People in lab coats like Bill Nye The Science Guy coming up with hypotheses and conducting tests to see if he was right. Although this idea wasn’t completely wrong it just isn’t the whole truth. “Science is both a body…