03 June 2025 Hacking Humans The article Hacking Humans: Protecting Our DNA from Cybercriminals, the author discusses if the digitization of DNA is safe. With the increased popularity of DNA testing services to discover the ethnic and medical background of an individual, DNA is digitized and placed into a database. The author argues that…
Author: aharp017
Discussion Board 3: Ethical Considerations of CRISPR Gene Editing
03 June 2025 Identify possible ethical considerations: In Malicious Code, the ethical considerations are the potential for hackers to use a person’s DNA to “infect” a computer through the embedding of a malicious code into a DNA sequence. This could make places like labs and health care facilities more prone to hackers. These are places…
Discussion Board 2: Protecting Availability
29 May 2025 As a CISO for a publicly traded company, I am responsible for all of the core functions outlined in the NIST cybersecurity framework. The core functions are identify, protect, detect, respond, and recover. I will implement these core functions to ensure the safety of the organization I responsible for protecting. Identify I…
Write-Up: The CIA Triad
28 May 2025 The CIA Triad The CIA Triad is also known as confidentiality, integrity, and availability. These elements are the crucial cybersecurity needs that are meant to “guide policies for information security within an organization” (Chai, 2023, p. 1). This is not to be confused with the AIC Triad, which is availability, integrity, and…
Discussion Board 1: The NIST Cybersecurity Framework
23 May 2025 From your readings of pages 1 – 21 of the NIST Cybersecurity Framework, what benefit can organizations gain from using this framework, and how would you use it at your future workplace? Benefit The framework allows organizations to implement the functions into already used programs. The intentions of the framework are not…
Write-Up: Components of a Business
22 May 2025 1. Identify other components of a business. Internal auditing is supposed to be an important component in businesses. This component ensures the business is following policies and procedures. This will determine if the business’s risk management process is effective or not. The internal audit includes 5 primary procedures: “risk identification, risk assessment,…