Vulnerabilities Associated with SCADA incritical Infrastructure

This write up explains how SCADA systems support our critical infrastructure while also showing where vulnerable. My main point is that even though SCADA technology was not originally built with cybersecurity in mind, it still plays a major role in reducing risks by giving operators real time visibility alarms, and control over essential processes.VulnerabilitiesWhen I…

Understanding Attacks on Availability in Cybersecurity

Attacks on availability are cyberattacks designed to shut systems down and block legitimate users from accessing important services. These attacks can be hugely disruptive, expensive, and dangerous for organizations. My bottom-line is that availability attacks are becoming more powerful every year, and strong defenses are now a necessity, not an optionWhat Is an Attack on…

Protecting Our DNA 

The digitization of human DNA has created new opportunities for science and medicine, but it also poses serious cybersecurity and ethical risks. My position is that while genetic technology offers promise, strict cyber security measures and legal oversight are essential to prevent identity theft and misuse of genetic data.  The Digital DNA Dilemma  In “hacking…

Career Paper

Cybersecurity Incident Response Analyst Robyn Brown School of Cybersecurity, Old Dominion University CYSE 201S: Cybersecurity and the Social Sciences  Diwakar Yalpi November 16, 2025   Cybersecurity Incident Response Analyst rely heavily on social science principles such as, psychology, sociology, human behavior, equity issues, and risk perception to investigate cyberattacks, protect digital systems, and support diverse groups of people who rely…

Article Review #2 Testing Human Ability to Detect Deepfake Images of Human Faces Robyn Brown School of Cybersecurity, Old Dominion UniversityCYSE 201S: Cybersecurity and the Social SciencesDiwakar YalpiNovember 18, 2025 Introduction/BLUF In this study Bray, Johnson and Kleinberg (2023) examine just how well everyday people can tell the difference between real human face images and…

Article Review 1

Robyn Brown  Old Dominion University  Article Review #1  Fall: CYSE 201S Cybersecurity and the Social Sciences  Yalpi  September 28,2025  Article Review #1   The selected article, Bullying Cyberbullying, and suicide by Hinduja and Patchin (2010) examines the relationship between cyberbullying and suicidal behavior among adolescents. This research is directly tied to the principles of social sciences,…

Discussion Board: The NIST Cybersecurity Framework

Sep 7,2025 The NIST Cybersecurity Framework gives organizations a roadmap for managing and reducing risk through five functions identify, protect, detect, respond, and recover. What stood out to me is how it connects security directly to business goals which means companies can make smarter decisions about where they invest time and money. This is important…