{"id":365,"date":"2025-06-26T00:06:32","date_gmt":"2025-06-26T00:06:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sfloy004\/?page_id=365"},"modified":"2025-12-01T02:29:33","modified_gmt":"2025-12-01T02:29:33","slug":"cybersecurity-technology-society","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sfloy004\/cybersecurity-technology-society\/","title":{"rendered":"CYBERSECURITY, TECHNOLOGY, SOCIETY"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><em>What is Cybersecurity, Technology, Society?<\/em> This course was for those selected to be apart of the Cybersecurity Living Learning Community (LLC) at Old Dominion University. It provided an interdisciplinary exploration of cybersecurity through the lenses of technology, ethics, business, criminology, and the social sciences. This course examined how cyber threats intersect with cultural values, legal frameworks, and global systems. Students completed assignments such as cybersecurity infographics, video reflections, weekly journal entries, discussion boards and a final analytical paper. These experiences strengthened my understanding of how cybersecurity operates across disciplines and  aided in my development as a cybersecurity professional.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Discussion Board: The NIST Framework <\/h2>\n\n\n\n<p>Instructions : From your readings of pages 1 \u2013 21 of the NIST Cybersecurity Framework., what benefit can organizations gain from using this framework, and how would you use it at your future workplace?<\/p>\n\n\n\n<p class=\"has-text-align-center\">Submission:<\/p>\n\n\n\n<p class=\"has-text-align-center\">The NIST framework can benefit organizations through creating structure and organization, I believe the most beneficial aspect of this framework is its versatility. Overall, this framework seems to be useful when it comes to helping an organization choose which direction it wants to go in whether that be its security, sales, etc. It would also be a benefit to organizations because it increases how safe its customers feel which can lead to attracting more customers.&nbsp; To double down on that, I feel that as this framework continues to develop and improve it will help ensure the safety of cyber related activities and endeavors. I would use the framework in my future workplace to aid in cyber security risk management. For example, say my company has recently had a breach occur, I would use the framework for guidance and ways to quickly recover and ensure what happened doesn\u2019t happen again.&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\">Back to &#8220;Home&#8221;<\/a> | | <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cyse-100\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cyse-100\/\">Back to &#8220;Cyber Explorers Experience&#8221;<\/a> |<\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/extracurricular\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/extracurricular\/\">Next to &#8220;Extracurriculars&#8221;<\/a> | <\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Write Up: The Human Factor in Cybersecurity <\/h2>\n\n\n\n<p class=\"has-text-align-center\"><strong>Cost and Reward: Cyber Technology and Training<\/strong><br>Within the past year there have been a total of 1,291 data breaches in the United States.<br>This number is progressively increasing as each year goes by. Out of those 1,291 a total of $4.24<br>million was spent on preventing and recovering from data breaches. Organizations that operate<br>within a limited budget must find a healthy balance between training and additional<br>cybersecurity technology that fits that company. My business has 400 employees and we have a<br>monthly $40,000 budget. I believe that due to the fact that there are websites that can train<br>individuals in cybersecurity , my primary focus would be on additional cybersecurity<br>technology.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Cybersecurity Technology<\/strong><br>Since a good portion of the budget is going into additional cybersecurity technology , I<br>would start by implementing Aura All In one Ultimate protection. Aura is one of the top rated<br>protection softwares, so due to the fact that I\u2019m focusing the budget on additional cybersecurity<br>technology.I believe the reward of protection outweighs the cost of implementation in the<br>business . Aura All In One Ultimate protection offers resources such as antivirus and malware<br>protection which would ensure that my employees have a low if not no risk of being breached.<br>An additional component would be the Aura VPN, this would serve as a 2nd wall of defense to<br>insure the safety of my employees and company data (Stop Viruses &amp; Malware in Their Tracks |<br>Aura Antivirus, n.d.). The total cost to install Aura All in One Ultimate for all 400 employees<br>would be about $12,000. As a precaution $1,500 will be saved just in case a problem comes up<br>with the Aura All in One Ultimate protection plan.<\/p>\n\n\n\n<p class=\"has-text-align-center\">In addition to Aura, my company will implement the Carbonite data backup and recovery<br>plan. In total this would cost $20,000( (Choose the Protection Thats Right for You, 2022). The<br>role Carbonite plays will be strictly ensuring that even if the company does fall victim to a data<br>breach , that we can recover as fast as possible. Along with back up for data and applications ,<br>Carbonite comes with a 256 bit encryption to aid in the security of data from outsiders.<br>Another security measure I plan to implement would be the DuoMobile Two Factor<br>Authentication. The total cost for all employees would come out to $1,200. With this method of<br>security it will make it harder for outsiders to obtain company data and applications the<br>employees have access to.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Cybersecurity Training<\/strong><br>So far I have spent $34,700 on additional cyber security technology. As for training , my<br>employees will use the Oxford Home Study Centre(OHSC). OHSC offers four to five star rated<br>training and allows employees to receive the cybersecurity training for free (Free Cyber Security<br>Courses | Free Online Cyber Security Courses | Free Cyber Security Certifications, n.d.). The<br>convenience of these free training courses eliminates the worry of not having enough funds to<br>provide sufficient training to my employees.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Remaining Budget Money<\/strong><br>The remaining $300 will go towards a bonus for the employee of the month. This will not<br>only find a use for the money in the budget leftover, but will also encourage my employees to<br>work as hard as they can.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>References:<br>Choose the protection thats right for you. (2022). Carbonite.<br>https:\/\/www.carbonite.com\/backup-software\/buy-carbonite-safe<br>Free Cyber Security Courses | free online cyber security courses | free cyber security<br>certifications. (n.d.). Oxford Home Study College.<br>https:\/\/www.oxfordhomestudy.com\/courses\/cyber-security-courses\/free-cyber-security-<br>courses<br>Stop Viruses &amp; Malware in Their Tracks | Aura Antivirus. (n.d.). Comprehensive<br>Protection for Your Finances, Identity, and Tech. Easy to Understand, Simple to Set up,<br>and All in One Place. https:\/\/buy.aura.com\/antivirus-plans-<br>3?irclickid=zna2dF0v4xyOTI3wUx0Mo38TUkA0zPyH01Ul0k0<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\">Back to &#8220;Home&#8221;<\/a> | | <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cyse-100\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cyse-100\/\">Back to &#8220;Cyber Explorers Experience&#8221;<\/a> |<\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/extracurricular\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/extracurricular\/\">Next to &#8220;Extracurriculars&#8221;<\/a> | <\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Write Up: SCADA Systems <\/h2>\n\n\n\n<p class=\"has-text-align-center\">SCADA: A Useful System for Business<br><strong>Intro to SCADA<\/strong><br>SCADA is an acronym for supervisory control and data acquisition(SCADA Systems). SCADA<br>systems comprise of hardware and software used to control infrastructure processes. This allows<br>organizations to monitor and control properties such as the site of a plant. What makes SCADA<br>convenient is the fact that it can be controlled both locally and remotely. Some of the best<br>features of SCADA include the ability to collect , process, and examine data all at once.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Components SCADA Systems<\/strong><br>Human Machine Interface(HMI) software controls contact between devices such as motors ,<br>sensors ,and valves. A standard of every SCADA system contains a remote terminal unit (RTU)<br>or programmable logic controllers (PLC). These components of a SCADA system collect data<br>and act as a bridge between the motors , sensors , valves, etc. The communication data collected<br>is then sent to SCADA computers where someone is able to analyze and react to changes within<br>the systems(Sivaranjith). These components ultimately made it easier to motor and control<br>processes within sites such as plants.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>SCADA Vulnerabilities<\/strong><br>Although SCADA may be more convenient , as people\u2019s understanding of technology has<br>developed, SCADA vulnerabilities are starting to show. The lack of an active network system<br>has left SCADA vulnerable to cyber attacks. Without an active network system it becomes<br>difficult to notice a cyberattack or react to one(Paganini). These types of cyber attacks could also<br>be a product of human error. Without a proper understanding of the traffic that runs through the<br>network, this lack of knowledge for the advanced data makes it hard to react to a cyber attack.<br>Authentication is another factor that leads to cyber attacks, an example of this would be a weak<br>password or method of authentication.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br><strong>Mitigating Risk<\/strong><br>Reducing the total number of hardware components would aid in minimizing the risk of a cyber<br>attack. Getting rid of hardware that is more of a risk than beneficial eliminates the risk of a virus<br>or unauthorized access(Lutz). Implementing a strong form of authentication would go a long way<br>in minimizing the risk of a cyber attack. This makes it harder for hackers to gain access to data<br>and information. Using a firewall would not only protect against hackers but also viruses.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Conclusion<\/strong><br>Some of SCADAs main primary functions are to monitor, process , analyze , and display data<br>collected. Although SCADA has many vulnerabilities I believe that with the right risk<br>management precautions, the chances of a cyber attack are very unlikely. Just like everything<br>related to technology, nothing is perfect and has the risk of being compromised. Like I said in an<br>earlier example , the best way I could explain SCADA to someone who is unfamiliar with the<br>topic would be that SCADA is like the bridge between collected data and an organization.<br>Overall I feel as though SCADA has more pros than cons and is effective in identifying and<br>reacting to cyberattacks.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>References:<br><br>Lutz, Natashia. \u201cManaging Scada Complexity \u2013 Minimizing Risk.\u201d VTScada by Trihedral,<br>17 Apr. 2018, https:\/\/www.vtscada.com\/managing-scada-complexity-minimizing-risk\/.<br>Paganini, Pierluigi. \u201cImproving Scada System Security.\u201d Infosec Resources, Infosec<br>Resources, 14 Oct. 2020, https:\/\/resources.infosecinstitute.com\/topic\/improving-scada-<br>system-security\/.<br>\u201cSCADA Systems.\u201d SCADA Systems, http:\/\/www.scadasystems.net\/.<br>Sivaranjith. \u201cComponents of SCADA.\u201d Instrumentation and Control Engineering, 11 Feb.<br>2019, https:\/\/automationforum.co\/components-of-scada\/.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\">Back to &#8220;Home&#8221;<\/a> | | <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cyse-100\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cyse-100\/\">Back to &#8220;Cyber Explorers Experience&#8221;<\/a> |<\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/extracurricular\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/extracurricular\/\">Next to &#8220;Extracurriculars&#8221;<\/a> | <\/p>\n\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Write Up: The CIA Triad<\/h2>\n\n\n\n<p class=\"has-text-align-center\">The CIA Triad also known as the AIC Triad is a model designed to aid in information security<br>within a company\/organization. The three main focal points of the CIA triad are the protection<br>and privacy , accuracy and trustworthiness , and the consistency and accessibility of<br>information. Although many believe it needs updates\/reforms , The CIA Triad provides a way for<br>organizations to retain their value when it comes to those three key areas. The differences<br>between Authentication and Authorization are a matter of identifying and permissions.<br>Authentication is simply who you are and confirming you are who you say you are while<br>authorization tends to be more private and confidential. A good example of authentication would<br>be how organizations allow verified employees to access the workplace systems, an example of<br>authorization would be needing a password or scanning a badge to access workplace systems<br>that aren\u2019t available to every employee.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/academics\/\">Back to &#8220;Home&#8221;<\/a> | | <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cyse-100\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cyse-100\/\">Back to &#8220;Cyber Explorers Experience&#8221;<\/a> |<\/p>\n\n\n\n<p class=\"has-text-align-center\">| <a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/extracurricular\/\" data-type=\"link\" data-id=\"https:\/\/sites.wp.odu.edu\/sfloy004\/extracurricular\/\">Next to &#8220;Extracurriculars&#8221;<\/a> | <\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Cybersecurity, Technology, Society? This course was for those selected to be apart of the Cybersecurity Living Learning Community (LLC) at Old Dominion University. It provided an interdisciplinary exploration of cybersecurity through the lenses of technology, ethics, business, criminology, and the social sciences. This course examined how cyber threats intersect with cultural values, legal&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sfloy004\/cybersecurity-technology-society\/\">Read More<\/a><\/div>\n","protected":false},"author":24920,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/pages\/365"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/users\/24920"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/pages\/365\/revisions"}],"predecessor-version":[{"id":538,"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/pages\/365\/revisions\/538"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sfloy004\/wp-json\/wp\/v2\/media?parent=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}