{"id":90,"date":"2025-05-03T16:13:54","date_gmt":"2025-05-03T16:13:54","guid":{"rendered":"https:\/\/student.wp.odu.edu\/pgagn002\/?p=90"},"modified":"2025-05-03T16:13:54","modified_gmt":"2025-05-03T16:13:54","slug":"cyse200t","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/pgagn002\/2025\/05\/03\/cyse200t\/","title":{"rendered":"cyse200t"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>Write Up: The CIA Triad<br>Phillip Gagnon, ODU, CYSE200t<br>&#8211; &#8211; &#8211;<br>In Cybersecurity the CIA triad is the teaching foundation. Cybersecurity is inherently an<br>interdisciplinary skill set with the primary role of defense. In this CIA touches the defense<br>foundations in Cyber defense: Confidentially, Integrity, Availability. Each with a primary role<br>that also overlap with each other.<br>&#8211; Confidentially: Defending your information from other. Restricting access to those who<br>are authorized to see it. This is where you\u2019ll see usernames and passwords come from.<br>You\u2019re proving your identity and that you are authorized to view certain information, if<br>you have been read into the correct classification level. Thing For official use only,<br>Unclassified or Top Secret.<br>&#8211; Integrity: The trust that your information has not been tampered with, that it has been<br>kept safe from editing. Here if you have the correct authorizations as stated above, you\u2019ll<br>be able to control permissions; who or what is authorized to make changes on a document<br>of if they are only allowed to read the information.<br>&#8211; Availability: that your information is available when you require it. Here back ups or<br>copies of your information are made in case of unfortunate events. Here you\u2019ll see<br>networks amount of redundancy\u2019s for when events happen against a company. Here Back<br>up sites are also seen. This level is constantly in use, whenever someone logs into their<br>work station.<br>Example: A day at work.<br>An Employee walking into their office building and provides the security guard with an<br>ID badge (1st layer of physical defense) in order to get to their office.<br>The employee sits at their workstation and enters their User name and password<br>(Confidentially). They enter the share drive on there companies network and access their<br>personnel\/private folder that only they are able to access in order access a document.<br>They open the document (Availability) in order to begin their work. They document is<br>saved on company servers in the basement and copies\/backups are made to a warm site 1000<br>miles away, just incase any events; acts of God to terrorism, force the primary (basement) to be shut down.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>SCADA Systems<br>Phillip Gagnon, ODU, CYSE 200T<br>&#8211; &#8211; &#8211; &#8211; &#8211;<br>Supervisory Control and Data Acquisition (SCADA) Systems are industrial control<br>networks typically used in infrastructure for the public; think powerplants, water treatment<br>centers, factories, and other industrial centers. (Google Doc). They allow the monitoring and<br>control of processes in these environments. Visualize a ship not a boat, any ship will do, a cruise<br>ship, warship, or even a science fiction spaceship! The ship requires power to function,<br>everything from the lights to the power for the engines that move it. SCADA allows the<br>monitoring of these engineering systems and even the rate of fuel flow (NIWC) from a central<br>location, think the bridge or engineering central station.<br>At the engineering central station, you have a Master control terminal (MTU). Think the<br>brain. This MTU is networked with multiple smaller computer remote units (RTU &amp; PLC) of<br>varying levels that are embedded in processes and devices throughout the area. This MTU<br>receives updates and can control these RTUs &amp; PLCs. Think of a temperature sensor that tells<br>central (MTU) if the engine is running to hot and therefore needs more coolant. The MTU then<br>can controls a valve (RTU\/PLC) to open and allow more coolant to the engine. This allows fewer<br>people over all to run the engines and allows an easier but more through way to manage them.<br>Now due to the important nature of this processes and controls they are very susceptible<br>to bad actors. The systems must be protected or air gapped to ensure the systems function<br>properly. Imagine a bad actor is able to access\/ Hack into the MTU or even an RTU, from there<br>they can cut off the flow of fuel or coolant no longer allowing the engine to run or forcing it to<br>overheat. With this it allows a \u201cPirate\u201d to steal a ship without even seeing it.<br>References<br>SCADA Systems as pulled from required google doc. (https:\/\/www.scadasystems.net) no longer<br>appears available.<br>Naval Information Warfare Center (NIWC). (2019, April 18). NIWC Atlantic delivers Advanced<br>Industrial Control System solution to the fleet. United States Navy.<br>https:\/\/www.navy.mil\/Press-Office\/News-Stories\/Article\/2239477\/niwc-atlantic-delivers-<br>advanced-industrial-control-system-solution-to-the-fleet\/<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<p>GAGNON, PHILLIP<br>CYSE 200T, Spring semester 2025.<br>\u200b<br>SCADA, command and control, and its future in the military.&nbsp;<\/p>\n\n\n\n<p>1. Supervisory control and data acquisition, SCADA:<\/p>\n\n\n\n<p>&nbsp;Scada systems are heavily in use for all types of public infrastructure in today&#8217;s society from water And sewer distribution, to power plant production of electricity; Plant systems and functions all the way to a wider grid That may span from a city to an entire region. Behind the scenes it Is the logistics for these networks that affects us all, it allows a central location to control devices and mechanisms that support the distribution of things vital to societal requirements and comforts. From a central location, you can control a pressure valve that allows water to pass into a system to cool it down or move potable water into residential homes. Or you can shut off power to a few City blocks to Triage a downed power line. SCADA has improved and advanced our infrastructure. And also improved the quality of life for those that work in this industry. What once used to require man hours to Physically move to a particular section of a system and turn a knob, Flip a switch, or spin a wheel can now be done with the click of a mouse on a human machine interface that has software to control the network in question.<\/p>\n\n\n\n<p>2. Command &amp; control, C2:<\/p>\n\n\n\n<p>Since the earliest days of warfare on the battlefield, command and control otherwise known as C2, is the movement of orders from the battlefield Commanders for their respective armies to various smaller units within the army. This has been a requirement for most successful militaries in history. Humans are innovators by nature, and attempt to make things easier, This applies to all facets of life. For example; 500 years ago orders were moved via horseback messenger as either notes or word of mouth. 200 years ago, Morse code Revolutionized the flow of information to entirely new regions At much faster speeds. Just under 100 years ago, radio transmissions allowed for lightning fast maneuver warfare, otherwise known as the blitzkrieg to reach a whole new level, And as a result changed warfare And the speed it is fought, ever since. Today C2 has become C6ISR. Command and control, communications, computers, Cyber defense, and combat systems. As well as intelligence, surveillance and reconnaissance. Human Capabilities for conflict have without a doubt improved since we first discovered fire. Today warfare encompasses all known domains; Sea Air and land, space, and cyberspace.<br>All of these Domains will require systems that are integrated into vast networks to allow the easy flow of information. Communications between computers and an assortment of combat systems all controlled by a command and control center and defended by specialized war fighters in Cyberspace. And compounded by the intelligence surveillance and reconnaissance conducted to achieve a goal.<\/p>\n\n\n\n<p>3. C6ISR and AI&nbsp;<\/p>\n\n\n\n<p>With the new onset of AI and it&#8217;s more accessible uses, it&#8217;s no doubt that it will become a new component on the battlefield. It&#8217;s already been theorized in multiple papers, books, and Movies in various forms. A common one that may be familiar is that advanced robotics integrated with artificial intelligence piloted systems are going to revolutionize the battlefield. It&#8217;s not a thing of science fiction anymore. We are already starting to see the beginnings of that in conflicts around the world. Massive drone networks controlled by fewer than five individuals could just be the start to a massive network of killing machines designed to work in conjunction with each other To close the kill chain.<\/p>\n\n\n\n<p>4. Integration&nbsp;<\/p>\n\n\n\n<p>Human components on the battlefield will not go away, but they may possibly diminish further and further as the years go on And innovation pushes advances in new areas. These new areas of course will require human minds to coordinate and set up before they can be put into service. It&#8217;s my opinion that there will be armies of humans that are working to secure these SCADA Networks of death. A network of this caliber that is exploited or not secure can therefore be hijacked by your opponent Or other persons with malicious intent. Either taking control of your systems or negating the systems ability to react on the battlefield at all. This without a doubt will cause a massive level of destruction to both your Cyber network, Your military industrial systems, and your society.<\/p>\n\n\n\n<p>5. Conclusion<\/p>\n\n\n\n<p>With these new advanced systems designed to better close kill chains, Just War Theory will no doubt be further studied and questioned. In theory, a Conflict between two peer nations would see unpiloted Combat machines receiving orders from a central location and fighting each other not just In the sea air and on land; But also outer space and cyberspace. These remotely piloted machines integrated into This network may allow for less loss of life and therefore might appear more appealing to governments all over the world. Which could lead into a whole new ethical dilemma. Endless conflicts; Wars of this Nature may appear more attractive and easier to conduct to pursue your own agendas And therefore may not be taken as seriously as it should be.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Write Up: The CIA TriadPhillip Gagnon, ODU, CYSE200t&#8211; &#8211; &#8211;In Cybersecurity the CIA triad is the teaching foundation. Cybersecurity is inherently aninterdisciplinary skill set with the primary role of defense. In this CIA touches the defensefoundations in Cyber defense: Confidentially,&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/pgagn002\/2025\/05\/03\/cyse200t\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28353,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts\/90"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/users\/28353"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/comments?post=90"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts\/90\/revisions"}],"predecessor-version":[{"id":91,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts\/90\/revisions\/91"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/media?parent=90"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/categories?post=90"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/tags?post=90"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}