top of page

Cybersecurity Technology & Society

In this course, we took an interdisciplinary approach to understanding cybersecurity. By drawing on knowledge from various fields like business, technology, criminal justice, sociology, psychology, and philosophy, we gained a holistic view of the subject. This approach allowed us to see how different aspects of cybersecurity are interconnected and how they impact our lives in complex ways.

The CIA Triad & Authentication vs Authorization

The Confidentiality, Integrity, and Availability (CIA) triad model guides organizations in forming their information security policies. Authentication ensures user identity verification, while authorization controls access rights. Understanding and implementing these principles are crucial for effective cybersecurity management.

Securing Critical Infrastructure: The Role of SCADA Systems

SCADA systems are crucial for safeguarding critical infrastructure against a wide range of threats including natural disasters, technological accidents, criminal activities, cyberattacks, and foreign influence. They provide real-time access to data and monitoring, proactive risk management via rapid response, and guidelines to ensure availability of critical infrastructure despite challenges.

Maximizing Cybersecurity Resilience on a Limited Budget

Balancing cybersecurity training and technology investments on a limited budget is crucial for organizations to strengthen their defenses against evolving threats. Organizations can maximize their cybersecurity resilience within budget requirements by prioritizing staff training and strategic technology acquisitions.

bottom of page