{"id":64,"date":"2025-11-17T19:38:19","date_gmt":"2025-11-17T19:38:19","guid":{"rendered":"https:\/\/student.wp.odu.edu\/bteag001\/?p=64"},"modified":"2025-11-17T19:38:19","modified_gmt":"2025-11-17T19:38:19","slug":"cyse-200t","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/bteag001\/2025\/11\/17\/cyse-200t\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"\n<p>Brandon Teague<\/p>\n\n\n\n<p>September 9, 2025<\/p>\n\n\n\n<p>CYSE 200T<\/p>\n\n\n\n<p>Professor Charles E. Kirkpatrick<\/p>\n\n\n\n<p>The CIA Triad:<\/p>\n\n\n\n<p>The CIA Triad consists of Confidentiality, Integrity and Availability. Confidentiality means keeping something secret or private. Integrity means that the information or data hasn\u2019t been tampered with, like when using digital signatures in email. And availability means that the data is there and ready. These three together form the basis for Cybersecurity, however as technology and defending this technology evolves so must the CIA triad. Such as adding authorization and authentication to the mix. Authorization determines what a person is allowed to do or not allowed to do. While authentication is verifying that the person trying to access something is authorized to do so. Examples of authentication would be passwords, 2FA, security tokens, etc. Authorization would be permissions, certain roles in your position or on the network. Both of them work together in a way but are different.<\/p>\n\n\n\n<p><strong>The risks and rewards of SCADA systems:<\/strong><\/p>\n\n\n\n<p>Brandon Teague<\/p>\n\n\n\n<p>Old Dominion University<\/p>\n\n\n\n<p>CYSE 200T<\/p>\n\n\n\n<p>Professor Charles E. Kirkpatrick<\/p>\n\n\n\n<p>October 12, 2025<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The vulnerabilities associated with critical infrastructure systems are the fact that more modern systems are connected to the internet which opens more areas of attack, human error on more localized networks (like plugging an infected USB into the network), some systems in place still use legacy hardware and software, and keeping these systems up to date and patched can be a challenge. If any of these risks were to be exploited there would be bad consequences since these systems are in place to protect such vital systems to our infrastructure. But because there are risks that doesn\u2019t mean there aren\u2019t any ways to protect these systems.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; One of the ways to mitigate these risks is to implement a full business or operational risk assessment. You would also need to implement normal security measures like you would for any network, principle of least privilege, setup firewalls and network segmentation, patching regularly, hardening devices, etc. These systems are critical to the infrastructure of so many important tasks and products so implementing security properly as well as training the personnel working on or around these systems is important.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SCADA plays a role in mitigating these vulnerabilities by organizing and separating the system into layers based on its specific roles and communication boundaries. The model used for this is called the Purdue model. This model separates the ICS and the IT systems. Ensuring that strong access controls can be enforced without affecting business operations. This model secures the SCADA system thus ensuring the business is protected as well.<\/p>\n\n\n\n<p><strong>References:<\/strong><\/p>\n\n\n\n<p>Fortinet. (2019). <em>Independent study pinpoints significant SCADA\/ICS security risks<\/em>.. <a href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/white-papers\/WP-Independent-Study-Pinpoints-Significant-Scada-ICS-Cybersecurity-Risks.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/white-papers\/WP-Independent-Study-Pinpoints-Significant-Scada-ICS-Cybersecurity-Risks.pdf<\/a><\/p>\n\n\n\n<p>Fortinet. (n.d.). <em>SCADA and SCADA systems<\/em>. Fortinet Cyberglossary. Retrieved October 7, 2025, from <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/scada-and-scada-systems\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.fortinet.com\/resources\/cyberglossary\/scada-and-scada-systems<\/a><\/p>\n\n\n\n<p>IEEE. (n.d.). <em>Cybersecurity of critical infrastructure with ICS\/SCADA systems<\/em>. IEEE Public Safety Technology. Retrieved October 7, 2025, from <a href=\"https:\/\/publicsafety.ieee.org\/topics\/cybersecurity-of-critical-infrastructure-with-ics-scada-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/publicsafety.ieee.org\/topics\/cybersecurity-of-critical-infrastructure-with-ics-scada-systems\/<\/a><\/p>\n\n\n\n<p>Palo Alto Networks. (n.d.). <em>What is the Purdue model for ICS security<\/em>. Palo Alto Networks Cyberpedia. Retrieved October 7, 2025, from <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-the-purdue-model-for-ics-security\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-the-purdue-model-for-ics-security<\/a><\/p>\n\n\n\n<p><em>SCADA systems<\/em>. (n.d.). Google Docs. Retrieved October 7, 2025, from <a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?tab=t.0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?tab=t.0<\/a><\/p>\n\n\n\n<p><strong>Balancing the Budget: A CISO Strategy for Cybersecurity Tradeoffs:<\/strong><\/p>\n\n\n\n<p>Brandon Teague<\/p>\n\n\n\n<p>Old Dominion University<\/p>\n\n\n\n<p>CYSE 200T<\/p>\n\n\n\n<p>Charles E. Kirkpatrick<\/p>\n\n\n\n<p>October 19, 2025<\/p>\n\n\n\n<p>I would allocate more funds towards training and the human side of my organization. Probably a 60\/40 split. 60% towards training and policy while the remaining 40% would go towards the technology, software, hardware, infrastructure, etc. Putting more money into the employees and their training would help mitigate any human error. If I allocated more funds towards technology and human error messed it up, then it would be a waste of money on both sides. However, if I were to invest in my personnel and keep them properly trained then equipment can be taken care of, hardened securely, the network will be maintained, and the organization would run into less issues. Also, if you don\u2019t have the right people and proper training, setting up any hardware can be done incorrectly, which would be a waste of funds, especially if you have a limited amount. Ultimately it comes down to what you are willing to invest in, and I am not willing to invest in unqualified and untrained personnel.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brandon Teague September 9, 2025 CYSE 200T Professor Charles E. Kirkpatrick The CIA Triad: The CIA Triad consists of Confidentiality, Integrity and Availability. Confidentiality means keeping something secret or private. Integrity means that the information or data hasn\u2019t been tampered&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/bteag001\/2025\/11\/17\/cyse-200t\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31210,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/bteag001\/wp-json\/wp\/v2\/posts\/64"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/bteag001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/bteag001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bteag001\/wp-json\/wp\/v2\/users\/31210"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bteag001\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/bteag001\/wp-json\/wp\/v2\/posts\/64\/revisions"}],"predecessor-version":[{"id":65,"href":"https:\/\/student.wp.odu.edu\/bteag001\/wp-json\/wp\/v2\/posts\/64\/revisions\/65"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/bteag001\/wp-json\/wp\/v2\/media?parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bteag001\/wp-json\/wp\/v2\/categories?post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bteag001\/wp-json\/wp\/v2\/tags?post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}