The CIA Triad—standing for Confidentiality, Integrity, and Availability—is a fundamental framework used in cybersecurity to shape policies and protect information systems. As explained in the Chai article, Confidentiality focuses on limiting access to data so only approved individuals can view it. Tools like encryption, secure passwords, two-factor authentication (2FA), and access restrictions help enforce this….
Hacking Humans
The article “Hacking Humans: Protecting Our DNA from Cybercriminals” by Juliette Rizkallah explores the growing concerns surrounding bio-cybersecurity—the protection of genetic information in an increasingly digital world. As DNA sequencing becomes more accessible, genetic data is now stored, processed, and shared through digital platforms. This raises serious privacy and security risks. DNA contains highly sensitive…
The Human Factor in Cybersecurity
Name: Ramon LeeTitle: Balancing Cybersecurity Training and Technology on a Limited BudgetBLUF: With a limited budget, I would prioritize cybersecurity training for employees whileinvesting strategically in essential technology to reduce human-related risks, which are theleading cause of cyber incidents.IntroductionIn today’s cybersecurity landscape, human error remains one of the largest vulnerabilities. Whileadvanced technology is important, the…
Write-Up – SCADA Systems
SCADA Systems and the Security of Critical InfrastructureCritical infrastructure systems like water treatment plants, electric grids, and gas pipelines are essential to everyday life. These systems rely heavily on SCADA (Supervisory Control and Data Acquisition) to keep things running smoothly. According to the article SCADA Systems, these applications are designed to monitor and control equipment…
Exploring Attacks on Availability
Ramon LeeAttack on Availability: DDoS Attack on Blizzard EntertainmentAn attack on availability refers to any cyberattack that disrupts or blocks access to systems,services, or data, making them unusable for intended users. These attacks target the corecybersecurity principle of availability by overwhelming or disabling critical resources.A well-known example occurred in September 2022, when Blizzard Entertainment, thegaming…
Annotated Bibliography
Annotated BibliographyRamon LeeOld Dominion UniversityCYSE 201S: Cybersecurity, Technology, and SocietyDr. Matthew UmphletJune 28, 2025Smith, A., Lee, B., & Patel, C. (2023). Understanding user behavior for enhancingcybersecurity training: An XR-based framework for user behavior analysis in criticalinfrastructure settings. *Information, 15*(12), 814. https://doi.org/10.3390/info15120814This peer-reviewed article introduces an XR-based cybersecurity training frameworkdesigned to analyze real-time user behavior during…
Title: Scientific Principles in Cybersecurity Understanding the principles of science helps explain how cybersecurity works in the real world.
CYSE 201S Journal EntryName: Ramon LeeDate: 05/29/25Journal Title: Scientific Principles in CybersecurityUnderstanding the principles of science helps explain how cybersecurity works in the real world.These principles guide how we analyze threats, respond to attacks, and protect systems.Relativism means that truth depends on the situation. In cybersecurity, this appears whendifferent organizations define “risk” differently based on…
NICE Workforce Framework
After reviewing the NICE Workforce Framework, I ranked the categories from mostinteresting to least interesting based on my career goals and personal interests. Here ismy ranking:1. Investigation (IN)2. Protection and Defense (PD)3. Oversight and Governance (OG)4. Implementation and Operation (IO)5. Systems Security Management6. Program Management7. Cybersecurity Policy and Planning8. Secure Project Management9. Security Control Assessment10….