Cybersecurity, Technology, and Society
Discussion Board (M2C): Protecting Availability
Discussion Overview:
In this discussion, I took on the role of a Chief Information Security Officer (CISO) for a publicly traded company. The objective was to explain what protections I would implement to ensure system availability and why those choices are important. The assignment also required responding to classmates by adding to or challenging their ideas.
My Response:
As a CISO, I would implement strong backup and recovery plans. Backups would be in different locations to protect the data in case of a system failure or ransomware attack. System redundancy would make sure we have extra servers and cloud failover options if one system fails. System downtime can cost a company lots of money. DDoS protection can help prevent attackers from overwhelming our network and systems.
Discussion Board (M3): Ethical Considerations of CRISPR Gene Editing
Discussion Overview:
This discussion focused on ethical issues related to CRISPR gene editing, based on BioCybersecurity readings. The goal was to identify ethical concerns, explain a personal position, and engage with classmates through thoughtful responses.
My Response:
CRISPR is a technology that can change the DNA of an organism. It has the potential to be used to treat diseases and improve the health of humans. However, there are some ethical considerations regarding the use of this technology. For instance, it is possible to use the technology to edit the genes of human embryos in order to include specific traits in those babies that are born. This could lead to certain advantages for those babies over other babies and potentially lead to inequalities between individuals.
Another issue related to the use of CRISPR is safety and cybersecurity. It is possible for the technology to create changes to the DNA of an organism that may lead to new health problems in those organisms. Additionally, research has published studies that show that malicious code could potentially be hidden within synthetic DNA in order to infect the computer that was used to input that synthetic DNA. The genetic information of individuals could potentially be stolen by cybercriminals using this technology. In my opinion, the best use of the CRISPR technology would be in the attempt to treat the diseases of individuals and increase the health of humans. However, regulations would need to be established in order to prevent unethical uses of this technology, as would improve the cybersecurity of computers that may be accessed via synthetic DNA.
Discussion Board (M7): Opportunities for Workplace Deviance
Discussion Overview:
In this discussion, I analyzed how cyber technology has created opportunities for workplace deviance. The assignment required a detailed response explaining how employees may misuse technology in the workplace.
My Response:
Cyber technology has made it easier for people to misbehave at work. The internet allows people to get distracted by things that have nothing to do with their job. People can shop online, scroll on social media, or watch videos while at work. This is known as time theft and costs companies money each year. Without the internet, it would have been difficult for people to get distracted from their work as there was little else to do at work. With cyber technology people have access to an entire world of entertainment at the touch of a button.
It has also become easier for dishonest employees to steal from their companies. With cyber technology, people can easily copy thousands of private company files onto a USB drive. People can also steal files and send them to their competitor in a few seconds. Employees can commit financial fraud with cyber technology. These crimes are not easily seen by the company. A computer literate employee can also hide their tracks. Cyber technology was created to make work more efficient for employees. But, it can also be misused to cause damage in the workplace. As technology continues to get better and better, companies will need to work harder to protect themselves from threats that come from both outside and inside their own walls.