I attended the 2025 TribeCTF, and I attempted challenges and solved a few. Overall, the event was fun, being packed full of vendors, offering free food, and lots of interaction with professionals. There were long periods of time dedicated to just working on the challenges. Personally, I didn’t like the AI assistant they offered it…
Major and Minor Exploration Assignment
If I were to add another program alongside my Cybersecurity major, I would choose Criminology, with a minor in Digital Behavior Studies. Criminology would provide me with a deeper understanding of offender motives, social factors, and investigative processes, which aligns well with the security and threat-analysis work I hope to pursue in the future with…
Understanding SCADA Systems and Critical Infrastructure Vulnerabilities
In this write-up, we explore the SCADA Systems article to better understand thevulnerabilities that affect critical infrastructure and how SCADA applications help reduce theserisks. SCADA systems play a vital role in controlling and monitoring essential services such asutilities, energy, water, and transportation networks. Because these systems are so critical toeveryday life, protecting them from potential…
Balancing Cybersecurity Investments: Training vs. Technology
In this write-up, we explore the role of cybersecurity investments to better understand thevulnerabilities that arise from human error and technological gaps, and how a combination oftraining and cybersecurity tools can help reduce these risks. Employees play a vital role inmaintaining organizational security, while technological defenses provide automated protectionagainst a wide range of threats. Because…
CIA Write Up
Understanding the CIA Triad and the Roles of Authentication vs. Authorization In this paper we discuss the CIA Triad (Confidentiality, Integrity, and Availability) which form the foundation of information security. Strong security also requires a clear distinction between authentication and authorization. This paper explains each principle and shows how they work together to protect data.CIA…