Hello! My name is Benjamin Song. Some things about me is I love to try new things, am currently learning how to play the piano, and want to travel more internationally.
As I do more research , I find that cyber security is a topic I must be more versatile in for the safety of those I care about, as well as myself.

DISCUSSION on CRISPR
I think CRISPR technology is used best when trying to correct any genetic diseases or natural, biological deformities from birth. Being able to treat any threatening condition that would cause issues in the future, such as sickle cell anemia or cancer. And while it has shown itself useful within the agricultural space, if we were to use this technology to “genetically advance” the world around us, it would result in a world that has progressed unnaturally. Creating microscopic discrepancies that could possibly break down society and ecosystems.
NIST: Cybersecurity Framework
Using the NIST framework, companies and organizations can gain the trust potential customers, business partners, and shareholders alike. As information is increasingly more accessible through almost any form of technology, it is imperative that those in charge of said organizations, or businesses, keep an altruistic reputation by keeping their community’s personal data secure. In doing so, this framework promises innovative security for critical infrastructure. The framework understands the importance of protecting data within society and the economy and will be effective by remaining technologically neutral. By upholding previous standards, guidelines, and practices while evolving those standards as technology evolves, the Framework will meet the technological markets needs so that those on the internet may be protected.
I can use the Framework by understanding it’s importance in the workplace and having a complete understanding on how the Framework works at the level I would first be working at. I would be most likely on the business/process level or the implementation/operations level at which I would be mostly focused on implementation progress, securing critical infrastructure, or addressing framework profiles. Implementing targeted improvements to certain gaps within the previous profiles, helping to identify new gaps, and suggesting new standards and guidelines to the updated profile would probably be within my most upcoming paygrade.
Opinions on CIA Triad
The CIA Triad, often referred to as the AIC (availability, integrity, and confidentiality) is
a model used by organizations and companies to develop their own security systems to create
solutions based on the vulnerabilities presented to them. Segmented into three parts,
differentiating these parts helps to guide each security team to address certain ways to deal with
the problem. Confidentiality refers to the security aspect of protecting information from unusual
sources. Integrity is more intended for the workers in charge of maintaining data so that no data
is changed. Lastly, availability allows for authorized users to access the confidential data and
properly maintain the systems so that the information may be displayed. When each standard is
secured, the security of the company becomes stronger and well equipped to deal with similar
online threats.
Confidentiality is one of the three stages that is designed as the firewall blocking out any
unwanted users to access certain information within an organization. At the same time, allowing
certain authenticated users to access reserved amounts of data, oftentimes personal data, to
safeguard the privacy of individuals within the database. Precise measures are categorized and
designed based on the type of damage and data after the breach of security. According to Chai
(2022),
“Confidentiality measures are designed to prevent sensitive information from
unauthorized access attempts.”
However, confidentiality assumes that those working to protect personal information would be
able to uphold the organization’s standard, or integrity, so ensure that no breach of privacy is
ever present.