{"id":133,"date":"2025-10-02T22:34:59","date_gmt":"2025-10-02T22:34:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-12-02T04:49:15","modified_gmt":"2025-12-02T04:49:15","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sadepfaulks\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading\">The CIA Triad<\/h2>\n\n\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-1-1024x576.png\" alt=\"\" class=\"wp-image-344\" style=\"width:542px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-1-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-1-300x169.png 300w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-1-768x432.png 768w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-1-1536x864.png 1536w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-1-533x300.png 533w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-1.png 1667w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p><strong>BLUF:<\/strong> The CIA Triad is a core cybersecurity model made up of confidentiality, integrity, and availability. Each part plays a specific role in protecting information, and together they help ensure data is secure, accurate, and accessible.<\/p>\n\n\n\n<p><strong>Confidentiality:<\/strong><br>Confidentiality is about making sure information is only seen by people who are authorized to access it. This is important because sensitive data like personal records, financial information, or passwords can cause serious harm if exposed. Organizations protect confidentiality by using passwords, encryption, and multi-factor authentication. For example, when you log into your online banking account and must enter a password and a one-time code, those steps help keep your financial information private.<\/p>\n\n\n\n<p><strong>Integrity:<\/strong><br>Integrity ensures that data remains accurate, complete, and unchanged unless modified by an authorized user. This is important because altered or corrupted data can lead to bad decisions, system failures, or security breaches. Tools like checksums, version control, access controls, and backups help maintain integrity. For example, if a student\u2019s grade is stored in a school database, integrity controls prevent unauthorized users from changing that grade.<\/p>\n\n\n\n<p><strong>Availability:<\/strong><br>Availability means that systems and data are accessible to authorized users when they need them. This is critical because even perfectly protected data is useless if it cannot be accessed. Availability is supported through regular system maintenance, updates, backups, redundancy, and disaster recovery plans. For example, a hospital\u2019s patient record system must remain online so doctors can access information quickly in emergencies.<\/p>\n\n\n\n<p><strong>Authentication vs. Authorization:<\/strong><br>Authentication is the process of verifying who a user is, while authorization determines what that user is allowed to do. Authentication happens first and includes methods like passwords, biometrics, or multi-factor authentication. Authorization then applies rules or permissions to control access. For example, logging into a school portal with your login credentials is authentication, but only instructors being able to edit grades is authorization.<\/p>\n\n\n\n<p><strong>Conclusion:<\/strong><br>The CIA Triad provides a clear framework for protecting information by focusing on confidentiality, integrity, and availability. Authentication and authorization support this framework by controlling identity and access. When all of these elements work together, organizations can better protect their systems and the data they rely on.<\/p>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading\"><strong>SCADA Systems<\/strong><\/h2>\n\n\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/AdobeStock_552777398-scaled-1-1-1024x683.jpeg\" alt=\"\" class=\"wp-image-342\" style=\"width:624px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/AdobeStock_552777398-scaled-1-1-1024x683.jpeg 1024w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/AdobeStock_552777398-scaled-1-1-300x200.jpeg 300w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/AdobeStock_552777398-scaled-1-1-768x512.jpeg 768w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/AdobeStock_552777398-scaled-1-1-1536x1024.jpeg 1536w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/AdobeStock_552777398-scaled-1-1-2048x1366.jpeg 2048w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/AdobeStock_552777398-scaled-1-1-960x640.jpeg 960w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/AdobeStock_552777398-scaled-1-1-450x300.jpeg 450w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p><strong>BLUF:<\/strong> Increasing technological integration of systems has created new vulnerabilities for critical infrastructure to experience cyberattacks. The real time monitoring capabilities of SCADA systems together with automated control and rapid response functions minimize these risks to protect important services from harm.<\/p>\n\n\n\n<p><strong>Vulnerabilities&nbsp;<\/strong><\/p>\n\n\n\n<p>The public depends on critical infrastructure systems which include power grids and water plants and transportation networks for both safety and everyday operations. However, as noted in the SCADA Systems article, many of these systems now rely on interconnected industrial control systems (ICS) that expose them to cyber threats. Older systems were originally designed to operate in isolation, so they often lack strong authentication or encryption. The connection of these systems to broader IT networks creates vulnerabilities to malware and ransomware attacks and remote intrusions which threaten the availability of critical public services.<\/p>\n\n\n\n<p><strong>SCADA in Risk Mitigation<\/strong><\/p>\n\n\n\n<p>SCADA systems manage and monitor these infrastructures by collecting and analyzing data from sensors and equipment. The OnLogic article explains that SCADA allows operators to oversee industrial processes locally or remotely, and offers immediate visibility into system performance. The system enables the detection of initial warning indicators that include temperature changes and pressure variations and mechanical breakdowns which otherwise would develop into major system failures. The system includes automatic pipeline flow interruption through SCADA software when sensors detect dangerous pressure levels.<\/p>\n\n\n\n<p><strong>Securing SCADA Systems<\/strong><\/p>\n\n\n\n<p>The operational control of SCADA systems faces security risks because they do not have sufficient protection systems in place. The SCADA Systems article points out that compromised SCADA networks could lead to major service disruptions like power blackouts or water contamination. Modern SCADA systems prevent these incidents through the implementation of network segmentation and intrusion detection systems and encryption protocols and strict access control measures.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>The protection of critical infrastructure depends on SCADA systems which also enhances efficiency. These systems provide ongoing surveillance capabilities and automated processes that help organizations make fast decisions to reduce the effects of system breakdowns or cyber threats. The effectiveness of SCADA systems depends on regular system updates and cybersecurity training for staff members as well as IT and operational team collaboration. The protection of operational systems that maintain society depends on implementing SCADA frameworks together with proactive security protocols.<\/p>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading\">Opportunites for workplace deviance<\/h2>\n\n\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-1024x576.png\" alt=\"\" class=\"wp-image-341\" style=\"width:675px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-1024x576.png 1024w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-300x169.png 300w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-768x432.png 768w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image-533x300.png 533w, https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-content\/uploads\/sites\/40056\/2025\/12\/image.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p><strong>BLUF<\/strong>: Cyber technology makes work easier, but it also gives employees way more chances to misuse devices, data, and communication tools, which leads to new types of workplace deviance.<\/p>\n\n\n\n<p>Cyber technology has changed the workplace in a good way, but it also opened the door for people to do things they probably shouldn\u2019t. Since most jobs rely on computers, employees have access to information and tools that can be misused pretty easily.<\/p>\n\n\n\n<p>One of the most common examples is wasting time online. It is simple for someone to scroll social media, stream videos, shop, or work on personal projects while on the clock. With remote work or less direct supervision, it is even harder for employers to notice when this is happening.<\/p>\n\n\n\n<p>Another problem is how easy it is to take or share sensitive information. An employee can download files they should not have, email documents to themselves, or share data with others without permission. Because everything is digital, one person can move a huge amount of information with almost no effort.<\/p>\n\n\n\n<p>Communication tools can also get misused. Things like group chats, emails, and messaging apps make it easier for people to gossip, make rude comments, or talk about coworkers in ways they wouldn\u2019t do face to face.<\/p>\n\n\n\n<p>There is also the issue of ignoring security rules. People reuse weak passwords, skip updates, click on bad links, or download sketchy apps because it is faster. Even if they don\u2019t mean harm, it still breaks policy and puts the workplace at risk.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>Overall, technology helps workplaces run better, but it also creates more chances for employees to break rules or act in unprofessional ways. Companies have to take these risks seriously and make sure people know how to use technology responsibly.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The CIA Triad BLUF: The CIA Triad is a core cybersecurity model made up of confidentiality, integrity, and availability. Each part plays a specific role in protecting information, and together they help ensure data is secure, accurate, and accessible. Confidentiality:Confidentiality is about making sure information is only seen by people who are authorized to access&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sadepfaulks\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":31646,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-json\/wp\/v2\/users\/31646"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":345,"href":"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-json\/wp\/v2\/pages\/133\/revisions\/345"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sadepfaulks\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}