NICE Framework The first position that caught my eye was the cybercrime investigator position. I found it very intriguing how as a cybercrime investigator you would be responsible for watching things that happens in the cyberspace which includes incidents and inclusion crimes (NICCS). Seeing that you must use many different tactics and techniques while using investigative tools to help balance… Read more →
Ethical Considerations of CRISPR Gene Editing
Ethical considerations in Biosecurity encompass a fine balance between safeguarding public health and respecting an individual’s humane rights. Implementing robust measures to prevent misuse of biological agents raises great concerns about potential discrimination, unintended consequences, and privacy. The right balance requires great and transparent communication, informed consent, and making sure that the biosecurity measures prioritize the public’s safety without defeating… Read more →
The “Short Arm” of Predictive Knowledge
Understanding the inherent constraints posed by the “short arm” of predictive information is crucial for successfully traversing the complex terrain of cyber-policy and infrastructure development. Our approach needs to be characterized by flexibility, vision, and teamwork as we tackle the ever-evolving nature of technology and its associated risks. A more comprehensive approach that incorporates a variety of viewpoints, specialties, and… Read more →
Opportunities for Workplace Deviance
Since cyber technology provides individuals unprecedented access to sensitive information as well as communication channels, it has significantly altered the conditions of workplace inappropriate conduct. Misconduct of many kinds, including data breaches, cybercrime, and illegal access to private information, are made possible by this access. Furthermore, workplace bullying, sexual harassment, and trademark theft have been made easy by the anonymity… Read more →
Protecting Availability
While there are several of protections to ensure availability of my system, if I was the CISO for a publicly traded company, the top three protections would be Distributed Denial of Service Mitigation (DDoS) and network security, data backup and disaster recovery, and redundancy and high availability architecture. First, I chose DDoS and network security because the Distributed Denial of… Read more →