Course Work

CYSE 200T

I completed some assignments during the semester in CYSE 200T: Introduction to Cybersecurity. These assignments reflect my understanding of cybersecurity concepts and their application in real-world scenarios!

  1. CIA Triad Analysis: This involved analyzing the CIA triad, which is are key principle in information security. I explored how each component plays an important role in protecting data and ensuring system reliability

In conclusion, the CIA triad serves as the cornerstone of effective information security. Each element contributes uniquely to safeguarding data, maintaining trust, and ensuring system functionality.

2.  SCADA Systems Overview: In this assignment, I explored Supervisory Control and Data Acquisition systems, which are essential for monitoring and controlling industrial processes. They collect real-time data from sensors and devices, allowing operators to manage operations such as water treatment, electrical grids, and manufacturing processes. ​I learned about the core components, like: Supervisory Computers, Remote Terminal Units, and Human-Machine Interfaces

In summary, SCADA systems play a vital role in modern industrial operations by providing real-time monitoring and control capabilities. Through this exploration, I gained a deeper understanding of their key components.

3. Human Factors in Cybersecurity: In this assignment, I explored how human behavior significantly impacts cybersecurity. I examined common human errors, such as falling for phishing scams, using weak passwords, and neglecting software updates, which can lead to security breaches. The assignment emphasized the importance of security awareness training and fostering a culture that prioritizes cybersecurity best practices. Understanding that human factors are often the weakest link in security chains highlighted the need for continuous education and vigilance to mitigate risks associated with human error.​…

“If I were the Chief Information Security Officer, I would first understand the importance of a smart approach to cybersecurity. An approach that balances technology investments and employee training is crucial. Even if I were within a limited budget, I would use the funds in a way that improves security resilience and reduces human error, which is a leading cause of cyber incidents.

Most of the time human error is the weakest link within cybersecurity, so I would allocate a good sized portion of the budget to employee training that focuses on: Security awareness training, simulation tests, and Role specific training. Regular training on engineering, password management, and browsing habits. Simulations would be used to test and reinforce security awareness and tailored training would be put on employees who handle sensitive data. This focuses on ensuring a security first mindset across mt organization, and empower employees to respond to threats quickly and effectively.

Training is essential, but tools are necessary to prevent and respond to online threats. Endpoint detection and response would be incorporated for monitoring and quick responses. Multi factor authentication will help to strengthen control and prevent unauthorized access. Firewalls, and prevention systems would also help with threats. Lastly, it would be a good idea to use AI to stream threat detections. All these different approaches could help balance the defenders against human error and cyberattacks.

By investing in more training, I will be able to address the root causes of security breaches while still maintaining defenses. This can help maximize the investment return. and leverage technology to defend against threats.”

____________________

In conclusion, human factors are one of the most critical vulnerabilities in cybersecurity. This assignment highlights the importance of addressing these challenges through ongoing education, awareness training, and a strong security culture.