Perception: Comparing Lyon and Slobodkina

Danny Lyon’s Boulevard Jean-Jacques Dessalines, Port-au-Prince [1983–1986] and Esphyr Slobodkina’s Composition with Red Circle [1950] illustrate the fundamental differences between representational and non-representational art. Lyon’s photograph is representational, capturing a physical street scene in Haiti to document social reality. In contrast, Slobodkina’s painting is non-representational, relying on formal elements such as geometric shapes and color…

The CIA Triad and Access Control in Cybersecurity

At its core, the CIA Triad serves as the foundational framework of cybersecurity by shapinghow organizations protect information systems through a balance of confidentiality,integrity, and availability. Confidentiality functions as privacy in the digital world byestablishing rules that limit access to sensitive data (Chai 2). Practices such as multi-factorauthentication and data encryption allow organizations to effectively…

The CIA Triad – History and Background

IaaS (Infrastructure as a Service), which is like if you rent a building you lock the doors, you control security and operations, and your responsibility is data security and firewalls. You’re responsible for securing everything. PaaS (Platform as a Service) is like when you own a kitchen (like a restaurant), you cook. So the provider…

Basic Components of a Business: Language vs. Strategy

In the professional world, Accounting serves as the “language” of business, providing a systematic process for recording, reporting, and analyzing financial transactions. In contrast, Finance acts as the “strategy,” focusing on how individuals or organizations manage, invest, and allocate capital to drive future growth. While accounting looks backward to ensure accuracy and transparency, finance looks…

The Evolution of Cybercrime: Beyond the Vacuum

The evolution of cybercrime did not occur in a vacuum, rather, it was a reactive cycle between emerging technologies and legal frameworks. Through my research, I found that existing laws often lagged behind rapid societal and technological shifts. This gap was addressed by forward-thinking advocacy from figures like NASA Administrator Bill Nelson, whose efforts helped…

Budget Allocation for Training and Technology

BLUF To effectively mitigate cyber threats driven by human behavior and workplacedeviance, I would recommend allocating 40% of the budget to behavioral training and60% to technical security. I believe this balance allows employees to act as a first line ofdefense while technology provides a necessary safety net for human error. The Human Element I believe…

Critical Infrastructure Vulnerabilities and the Role of SCADA Systems in Reducing those Risks

BLUF The integration of computer networks with physical infrastructure like powergrids increases the risk of cyberattacks. Organizations must utilize Supervisory Controland Data Acquisition (SCADA) systems to monitor operations and provide the rapidresponse capabilities necessary to maintain public safety. Critical Infrastructure Vulnerabilities Critical infrastructure includes systems people rely on every day, such as electricity,transportation and manufacturing….