The “Short Arm” of Predictive Knowledge.

We must approach the cybersecurity infrastructure and its policies from an adaptive point of view. We can make polices and they will work for a period of time, until a new threat comes along that makes that policy useless. We are unable to properly predict what the next cyberattack will be, it could be a…

Presentation, CDRE O’Donovan.

In Class: CDRE O’Donovan.BLUF: The Navy has begun to move toward a Zero Trust way of cyber security, as wellas encrypting any and all data and IPs that are sent from boats and setting up properredundancy to ensure its encrypted properly.Moving Toward Zero Trust.Zero trust is the way of the future for Cybersecurity, Captain O’Donovan…

SCADA Systems

Critical Infrastructure and SCADA. BLUF: SCADA is essential in protecting Critical Infrastructure, by encrypting data,monitoring devices and systems, and minimizing insider threat. What is SCADA?Supervisory Control & Data Acquisition (SCADA) is a system that consist ofhardware and software and is primarily used in the industrial industry. SCADA allows theseindustries to manage their equipment and data…

Ethical Considerations of CRISPR Gene Editing

With the surge of DNA testing in the last decade or more, we have seen millions of people put their trust in these companies to keep their DNA data safe. These companies need to be properly protected or they could face a breach, and have all the data stolen. If this where to happen criminals…

CIA Triad Write up

Nick ClineFebruary 17th, 2026CYSE 200TProfessor DuvallThe CIA Triad Bluf: The CIA triad is a crucial piece in the field of cybersecurity, without it company’s would lose millions of dollars and data.Confidentiality The CIA triad consists of three main components, the first being confidentiality. This is what monitors who has access to the data, turning away…