{"id":189,"date":"2025-02-03T04:39:03","date_gmt":"2025-02-03T04:39:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/armanrusselleport\/?page_id=189"},"modified":"2025-04-28T01:41:35","modified_gmt":"2025-04-28T01:41:35","slug":"hello-im-arman-russell-from-ashburn-virginia-i-am-currently-studying-computer-science-motivated-by-my-enthusiasm-for-technology-and-problem-solving-the-transformative-power-of-computers","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/armanrusselleport\/","title":{"rendered":"Hello! I\u2019m Arman Russell from Ashburn, Virginia. I am currently studying Computer Science, motivated by my enthusiasm for technology and problem-solving. The transformative power of computers and software has always intrigued me, and I am dedicated to thoroughly exploring this field, acquiring extensive knowledge, and applying it in innovative ways.  As I progress through my studies, I seek to challenge myself and extend my limits while remaining focused on my primary objective: to create a significant impact in the technology sector. Whether through programming, software development, or investigating new technologies, I look forward to enhancing my skills and understanding in the dynamic realm of computer science.  Thank you for taking the time to visit my portfolio\u2014please feel free to browse my projects and discover more about my work!"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Discussion Board Posts<\/h2>\n\n\n\n<ul>\n<li>You are the\u00a0<strong>CISO\u00a0<\/strong>for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?<\/li>\n<\/ul>\n\n\n\n<p>As the Chief Information Security Officer of a publicly traded company, making sure that the availability of our systems is basic foundation to preserving trust, operational functions, and advantage. I would implement a multi-strategy approach that includes redundancy, proactive monitoring, and rapid incident response. To Start I would have a redundant pair of data centers, with distributed cloud capacities strategically positioned to provide geographic separation between the two, would minimize the number of possible single points of failure. High-availability configurations such as failover clusters (which will take over when one node fails) and load-balancing equipment (to redistribute traffic from a congested interface) carry out this task automatically. The second layer of defense involves installing systems to make it difficult for attacking networks, as well as setting up network-y (OS fingerprinting) to name but a few protective measures, in order to resist external attacks that want to cut off services. Third, a disaster recovery plan vigorously tested and regular automatic backups can ensure that crucial data rapidly comes back after an incident. Moreover, continuous monitoring of performance and real time alarm systems should keenly catch any signs of malfunctioning before small incidents grow into major problems. In addition, scheduled security audits, training for staff, and exercises simulating the effect of attacks are all means to tighten our system further. Together, these preventive steps build up a durable environment that keeps resources available, off loads risk, and maintains confidence of stakeholders including investors too while meeting the regulatory standards expected of companies trading their shares on public markets. Not only will these measures protect against interruptions, but they will also help secure long-term stability and excellence of business operations.<\/p>\n\n\n\n<ul>\n<li>How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world?\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p>With these\u2002things, state power is declining, and the material world is becoming increasingly intelligified and networked, so regulation will have to keep up or be based on the same decentralized and fast moving basis as technology itself. With the advent of smart devices, algorithms and digital platforms\u2002facilitating human interactions and social relationships, traditional top down governance is becoming inadequate. Humanity must hold markets and businesses accountable not only for their economic impact (for example, in terms of job losses, but also in terms of how they ethically use the data they accumulate and the social impact\u2002of their technologies. In a similar vein, people and organizations require more extensive guidelines and digital literacy to interact and engage responsibly\u2002in an increasingly hyper connected world. In a data driven world increasingly subject to intelligent systems, regulation should be more multi system, proactive, and tech savvy, engaging stakeholders on both sides of the digital divide to cut fair use, privacy\u2002and democratic oversight at the path.<\/p>\n\n\n\n<ul>\n<li>From this week&#8217;s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge?<\/li>\n<\/ul>\n\n\n\n<p>In light of the \u201cshort arm\u201d\u2002of predictive knowledge that Jonas writes about, we should handle the crafting of cyber policy and infrastructure with an acute sense of precaution and moral obligation. Since we cannot fully anticipate the long term effects of new technologies, especially in rapidly advancing areas like cybersecurity, our policies should be nimble, flexible, and focused on\u2002a commitment to minimizing risks of harm. It means valuing resilience, transparency, and inclusivity in the decision making method,\u2002while also considering the larger social and environmental challenges that may not be apparent at the moment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discussion Board Posts As the Chief Information Security Officer of a publicly traded company, making sure that the availability of our systems is basic foundation to preserving trust, operational functions, and advantage. I would implement a multi-strategy approach that includes redundancy, proactive monitoring, and rapid incident response. To Start I would have a redundant pair &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/armanrusselleport\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Hello! I\u2019m Arman Russell from Ashburn, Virginia. I am currently studying Computer Science, motivated by my enthusiasm for technology and problem-solving. The transformative power of computers and software has always intrigued me, and I am dedicated to thoroughly exploring this field, acquiring extensive knowledge, and applying it in innovative ways.  As I progress through my studies, I seek to challenge myself and extend my limits while remaining focused on my primary objective: to create a significant impact in the technology sector. Whether through programming, software development, or investigating new technologies, I look forward to enhancing my skills and understanding in the dynamic realm of computer science.  Thank you for taking the time to visit my portfolio\u2014please feel free to browse my projects and discover more about my work!<\/span><\/a><\/p>\n","protected":false},"author":30523,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/armanrusselleport\/wp-json\/wp\/v2\/pages\/189"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/armanrusselleport\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/armanrusselleport\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/armanrusselleport\/wp-json\/wp\/v2\/users\/30523"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/armanrusselleport\/wp-json\/wp\/v2\/comments?post=189"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/armanrusselleport\/wp-json\/wp\/v2\/pages\/189\/revisions"}],"predecessor-version":[{"id":197,"href":"https:\/\/sites.wp.odu.edu\/armanrusselleport\/wp-json\/wp\/v2\/pages\/189\/revisions\/197"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/armanrusselleport\/wp-json\/wp\/v2\/media?parent=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}