The CIA Triad—Confidentiality, Integrity, and Availability—is foundational to cybersecurity andis a key concept for companies seeking to protect their information systems (Chai, 2022). Authentication and authorization are two different processes that help protect the CIA Triad.They work by verifying a user’s identity and then deciding who can access certain resources.Together, these processes support modern information…
SCADA Systems and Critical Infrastructure Security
BLUF SCADA systems monitor and control water treatment plants, energy systems, and transportation networks. These systems help organizations handle large industrial operations, but they can also make them more vulnerable to cyberattacks if not adequately protected. Knowing SCADA systems’ weaknesses is crucial because attacks on them could disrupt vital services. Introduction A lot of the…
Article Review #2 – Cybersecurity Education and Gender
Article:Jethwani, M. M., Memon, N., Seo, W., & Richer, A. (2017). I can actually be a super sleuth: Promising practices for engaging adolescent girls in cybersecurity education. Journal of Educational Computing Research, 55(1), 3–25. Article link: “I Can Actually Be a Super Sleuth” Promising Practices for Engaging Adolescent Girls in Cybersecurity Education – Old Dominion…
Article Review #1 – Psychological Profile of Cybercriminals
Article:Trinh, D. T., et al. (2025). Exploring the Psychological Profile of Cybercriminals: A Comprehensive Review for Improved Cybercrime Prevention. International Journal of Cyber Criminology. Article Link:View of Exploring the Psychological Profile of Cybercriminals: A Comprehensive Review for Improved Cybercrime Prevention Figure 1. This image depicts cybercriminal behavior and highlights the human factors involved in cybercrime….