{"id":217,"date":"2024-12-02T17:40:16","date_gmt":"2024-12-02T17:40:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alexbretana\/?page_id=217"},"modified":"2025-11-30T20:52:02","modified_gmt":"2025-11-30T20:52:02","slug":"discussions","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/alexbretana\/discussions\/","title":{"rendered":"Discussions"},"content":{"rendered":"\n<div class=\"wp-block-buttons has-custom-font-size has-regular-font-size is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-midnight-gradient-background has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/alexbretana\/resume-alex-bretana\/\">Resume<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-midnight-gradient-background has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/alexbretana\/discussions\/\">Discussions<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-outline\"><a class=\"wp-block-button__link has-white-color has-midnight-gradient-background has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/alexbretana\/criminology-reflection\/\">(CRJS 215S) Criminology Reflection<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-midnight-gradient-background has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/alexbretana\/finding-cybersecurity-everywhere-fortune-500\/\">(CYSE 200T) Finding Cybersecurity Everywhere: Fortune 500<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-midnight-gradient-background has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/alexbretana\/cyse-201s\/\">CYSE 201S<\/a><\/div>\n\n\n\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-midnight-gradient-background has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/alexbretana\/cyse-270\/\">CYSE 270<\/a><\/div>\n<\/div>\n\n\n\n<p><strong>During the course of the year, we have done several discussion boards debating current and past cybersecurity issues. Here are some of my responses.<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-1381eee2d9904b4f73903eedf4aeb932\"><strong>From Verbeek&#8217;s writing (Mod 6, Reading 4) Designing the Public Sphere: Information Technologies and the Politics of Mediation<\/strong> <strong>&#8211; How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world?<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-a33395ddbc20962f76c15122d1142ec4\" style=\"font-size:16px\">My answer: As state power wanes and technology rapidly advances, markets, businesses, groups, and individuals need proactive regulation. Decentralized systems like blockchain can help ensure ethical standards and transparency in markets. Businesses must be accountable for their technologies and data practices, while groups should protect against manipulation and prioritize digital literacy. Individuals must also adopt privacy safeguards and digital responsibility. Preemptive regulation and education are key to navigating a networked world and minimizing harm.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-22e48ba3d89790f4a570d9e8f9b5b7bb\"><strong>Opportunities for Workplace Deviance<\/strong> <strong>&#8211; How has cyber technology created opportunities for workplace deviance?<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-d7e9d839d134a5570b1c1880c38443c2\" style=\"font-size:16px\">My answer: Cyber technology has created many different opportunities for workplace deviance. Remote work is incredibly commonplace nowadays, so many people choose to lax off at work and not do their jobs. Employees have done everything from simply not turning their cameras on so they can sleep, to automating their jobs with AI scripting tools. The only way an employer can know that the person logging in is actually the person they say they are, is through systems like two-factor authentication. Additionally that SCADA systems are so prevalent, any rogue or disgruntled employee can access and edit information critical to the company&#8217;s processes.<\/p>\n\n\n\n<p class=\"has-black-color has-very-light-gray-to-cyan-bluish-gray-gradient-background has-text-color has-background has-link-color wp-elements-c9540884d67099e7ef0963ff338dfb1a\"><strong>During this week&#8217;s reading, you&#8217;ve been exposed to different points of view regarding human contribution to cyber threats.&nbsp; Now, put on your Chief Information Security Officer hat.&nbsp; Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology?&nbsp; That is, how would you allocate your limited funds?&nbsp; Explain your reasoning.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-9817e6b74d447073d6ae2eaaac99ed4e\" style=\"font-size:16px\">My answer: As a hypothetical CISO, or Chief Information Security Officer, I would prioritize<br>training over additional cybersecurity software. Consistently purchasing new software would<br>leave employees drowning and overwhelmed by having to learn completely new systems every<br>other month. I would choose to consistently train employees to adapt to modern techniques and<br>on how to mitigate modern styles of cyber-attacks. I would use services such as Cybeready and<br>Ninjio, which keep employees trained and up to date on the current landscape of cybercrime and<br>cybersecurity. In a perfect world, funding and time would be split 70\/30, with 70 percent towards<br>training, and 30 percent towards new and updated software. I feel that this would create an ideal<br>balance between effective employees, and new-enough software to defend against attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the course of the year, we have done several discussion boards debating current and past cybersecurity issues. Here are some of my responses. From Verbeek&#8217;s writing (Mod 6, Reading 4) Designing the Public Sphere: Information Technologies and the Politics of Mediation &#8211; How should markets, businesses, groups, and individuals be regulated or limited differently&hellip;<\/p>\n","protected":false},"author":29863,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alexbretana\/wp-json\/wp\/v2\/pages\/217"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alexbretana\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alexbretana\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexbretana\/wp-json\/wp\/v2\/users\/29863"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexbretana\/wp-json\/wp\/v2\/comments?post=217"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/alexbretana\/wp-json\/wp\/v2\/pages\/217\/revisions"}],"predecessor-version":[{"id":349,"href":"https:\/\/sites.wp.odu.edu\/alexbretana\/wp-json\/wp\/v2\/pages\/217\/revisions\/349"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alexbretana\/wp-json\/wp\/v2\/media?parent=217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}