Discussion Boards- Fall 2022:
Going on a Job Hunt: Upon reading the article, I researched the two jobs that I found the most intriguing. The first job that I studied was as an Information Security Analyst. Their job insists to monitor their organization’s networks for security breaches and investigate the problem when it happens. In other words, they plan and carry out infosecurity systems. The next job that I did research on was a Cloud Security Architect, and their job is to protect and secure applications and data in the cloud. To work in these positions, you have to have skills like networking, project management, problem-solving, and even simple communication! Both of these jobs suggest that you have at least a bachelor’s degree in computer science, information technology, computer engineering, cybersecurity, or any related field. You also have to withhold multiple certifications to obtain this job. The most surprising part of my research that I found was that sometimes certificates weigh more than a degree. Alike these two jobs, the rest of the jobs listed in the article take lots of knowledge and experience to work in. Everyone majoring in cybersecurity should do their research about these jobs and figure out which one would be the best fit for them.
Ethical Considerations of CRISPR Gene Editing: CRISPR Gene Editing is such a dangerous, yet luxurious thing to expose to the human race. Yes, gene editing is literally a real life simulation and you can design every aspect of a person how you would want them to be. Even though this would be a revolutionary idea, it would not be safe. The biggest possible ethical consideration would be safety. Gene editing has not been researched or studied enough to be used. Being able to create the “perfect person” would cause lots of problems within society and the healthcare system. Wealthier people would also have a greater advantage by possibly creating a completely different social class. There are more than enough downsides to Gene Editing that shows why our society should not have access to such a thing.
Protecting Availabilities: As a CISO, it is an important step to ensure that your business is safe and secure from any possibility of a cyberattack. The first step that should be taken to ensure the availability to authorized parties is device protection and security. It is very important to make sure that all of the devices used to access business documents and property are updated often and have antivirus and antispyware software downloaded on the devices. These software programs are installed on the computer to diminish adds and bugs that can effect your computer. There also needs to be firewalls on the computer, which can block communication from people and things that are outside sources. All CISO’s need to enforce to be careful what you click and/or look at on your work device. A lot of phishing attacks happen through emails that look like they may be from real companies. It is also important to keep your private and personal information off of the work devices.