• Fundamentals of Human-Centric Artificial Intelligence (A.I.): Comparative Analysis of Europe and the U.S. Landscape
  • SpamBlocker2k Business Plan
What you waitin' for?

What you waitin' for?

Create your slideshow now!

A Super Lightweight Slider

A Super Lightweight Slider

100% WordPress and Bootstrap

Visualize Your Ideas.

Visualize Your Ideas.

And customize everything.

  1. What you waitin' for?
    What you waitin' for?
  2. A Super Lightweight Slider
    A Super Lightweight Slider
  3. Visualize Your Ideas.
    Visualize Your Ideas.

Old Dominion University

Torre Williams

Reflections of Cybersecurity Ethics

Torré Williams

PHIL 355E

Professor Nicol

09 December 2021

Reflective essay

In this reflective essay, I will be showing the top three ethical tools that changed or helped deepen my views on certain areas in my life. My understanding of these tools will help me along as I continue preparing for my career. A lot of these tools showed the importance of acting selflessly in different aspects of your life.

Contractarianism

This tool, tells us that society has an underline social contract between one another and between employers. As an organization, there is a shared mutual contract that is shared with its employees and customers. That shared contract is a contract of trust, respect, and loyalty among its customers. The idea of morality is what is designated to create rules that will allow people to live together in harmony and have a great life. My thoughts on this ethical tool are that throughout life, there is no such thing as living in self-interest. We all have responsibilities and are accountable for every action, that we make towards each other. We should act in a way that we want people to show us in return. With these underlying social contracts, we are responsible for abiding by them and ensuring that there is mutual respect that remains.

Ethics of care

To fully show and give care is beyond a duty. Care is something that should be described as a job. It acts as an emotional component. It acts as a dependent component for any relationship, that you may have. This care focused on getting us to see, that we take these morals of impartiality and justice then justify them with ourselves or with others on why we do what we do. Looking at this tool, we should show care to our employers, employees, or family because it is the right thing to do. Caring for someone shouldn’t be forced but it’s a willing feeling that needs to be done. Avoid bringing harm to those we care about and stand up for what is right. For example, a whistleblower. Being a whistleblower means that you have enough care and respect to be able to stand up for other people because the company, that you may work for is not respecting the people around them.

Confucian

In this ethical tool as a Confucian, it is more important that you stay on your path than the action you make based on a good decision. Every person is designated a path that he/she is supposed to take. Whether you stay on that path is up to you. I’ve seen in a couple of stories from this class, that can be frustrating to those that are in a higher position that sees you not staying on your path. For me, my path is to finish college, graduate with a degree, and get a successful job in my field. Not finishing college nor being successful will be a disappointment in the eyes of a Confucianist. We are encouraged to act within our roles and reflect onto others with our roles while encouraging them to act within their roles, as well.

All three of these ethical tools have given me a greater understanding of how to live a respectable, honorable, and trustworthy citizen. Living in this world where my job is to do unto others as I would want them to do me. How well I attend to my roles and responsibilities reflects who I am and who I want to be.

Leave a comment

What role do engineers have in managing cyber risks?

Torre Williams
Professor Kirkpatrick
CYSE-200
10 February 2019
What role do engineers have in managing cyber risks?
In the engineering world, some of the issues they tend to face due to the increase of cyber risk are to successively assess the risk effectively and make the appropriate investment to manage the risk as low as possible. As a result, IT and Engineers are called to work together with a common language that both can operate under on the same page to get the job done effectively.
To assess a cyber risk, the engineering community may use what is called a Risk Assessment
Methodology and a Bow- Tie Model. The Bow-Tie Model is a model that evaluates all hazards that could result as a top event. Also, as well as evaluating hazardous events, it can also be translated into cyber risks by considering all the current threats landscape. The Risk Assessment
Methodology Model conducts cyber risk management by running through the Bow-Tie Model. The way that the Bow-Tie Model will evaluate hazardous events, it will do the same thing for conducting cyber risk management. Though you have these models to help manage these cyber risks, you have a specialized engineer that focuses on systems that deal with disruptions such as natural disasters and cyber-attacks. This type of special engineer is a Security Engineer. They also ensure that hardware, software, and malware, etc… are running properly, and tries to look for possible issues that could arise in the future. They are responsible for testing, screening, and monitoring security software and networks for any intrusions or breaches. Not only do these engineers know how to point out any threats but also know the necessary steps to prepare themselves so that no threats happen.
Reading Room. (n.d.). Retrieved from https://www.sans.org/reading
room/whitepapers/ICS/paper/37017
Security Engineer. (n.d.). Retrieved from https://www.careerexplorer.com/careers/security
engineer

Leave a comment

What are four ethical issues that arise when storing electronic information about individuals?

Torre Williams
Professor Kirkpatrick
CYSE-200
03 February 2019
What are four ethical issues that arise when storing electronic information about
individuals?
The four ethical issues are the following: Fraud /Theft, Insider Threat, Malicious Hacker,
and Malicious Code. Fraud and Theft are often caused by the hands of authorized administrators,
who are familiarized with the systems. According to the reading, the primary cause of Fraud and
Theft is financial gain. Fraud and Theft are often found among social media, for example,
Facebook, Twitter, and Instagram etc… Social media tends to be used daily, where people tend to not
realize the greater amount of personal information that’s online without being mindful, often bring
about Fraud and Theft. With the use of social media, the results of attackers stealing personal
information can lead up to a social engineering attack. Social Engineering Attack is a
technique that monitors the human interactions that dealt with influenced individuals that have violated
protocol and indulged themselves in things that were very confidential. Along with this,
the APT (Advanced Persistent Threat) is a threat that is a long-term intrusion that gains access to data
and specific information. The second issue is dealing with the Insider Threat. This type of threat
deals with monitoring by the employees who are familiar with the system. They often point
out what was the cause of damage, disorder, and mischief. Also, employee sabotage is another way that causes an Insider Threat. Some examples of the employee sabotage are the following: destroying facilities and hardware, crashing systems, and changing administration passwords to prevent systems access. The third issue is Malicious Hacker. This type of threat deals with people who fully understand networking, programming, and computers to illegally cause damage, steal information and access the systems. The motivation that these anonymous hackers have given these organizations was the motivation to implement new security that is strong enough to protect these organizations. Lastly is the Malicious Code,
which is a virus created for the purpose of attacking a platform. A different division of the
Malicious Code is the following: logic bomb and the worm etc…. All together these divisions of the Malicious Code are many programs that carry out different functions as required.

An Introduction to Information Security.pdf (n.d). Retrieved from
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-12r1.pdf

Leave a comment

About “Me”

My name is Torre Williams and I’m a Junior here at Old Dominion University.  I am majoring in Cyber Security with a minor in Criminal Justice. After I finish my Bachelor’s degree, I will be continuing my education by attending Graduate School. Here at Old Dominion University, I’m apart of many organizations as well as clubs. I am apart of the LeADERS program, Cybersecurity Student Association, The National Society of Collegiate Scholars (NSCS), Association for Computing Machinery Women (ACM-W), and Women Club Basketball. I also completed a Cybersecurity Undergraduate Research Program.  My plan is to become a Cybersecurity Analyst and eventually transition into Digital Forensics. My career goal is to work with the FBI.

Leave a comment

    WordPress Theme Custom Community 2 developed by Macho Themes

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept