26 June 2025 How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world? Verbeek’s writing explains that the designers of these “smart” devices need to implement more security features. For example, Google’s glasses should have…
Write Up: The Human Factor in Cybersecurity
22 June 2025 During this week’s reading, you’ve been exposed to different points of view regarding human contribution to cyber threats. Now, put on your Chief Information Security Officer hat. Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology? That is,…
Write Up: Exploring Attacks on Availability
22 June 2025 In this assignment, you will research and analyze different types of cyberattacks that target the availability of systems, networks, or data, which is one of the core principles of cybersecurity. Known as “Attacks on Availability,” these are incidents where malicious actors attempt to disrupt access to critical resources, making them inaccessible to users. Such…
Discussion Board 5: The “Short Arm” of Predictive Knowledge
17 June 2025 From this week’s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? For this week’s reading, Jonas makes it a point that we as humans tend to think of the short-term (short arm) outcome rather than the long-term outcome. With technology constantly…
Write-Up: SCADA Systems
13 June 2025 In this write-up you will use the SCADA Systems article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks. Critical infrastructure systems have been proven over time to be vulnerable to cyber threats and attacks. Proper measures…
Discussion Board 4: Opportunities for Workplace Deviance
12 June 2025 How has cyber technology created opportunities for workplace deviance? Cyber technology has allowed the easy access to internet/applications that can cause workplace distractions for workers. If access is not limited for an employee’s work computer, they have the chance to lower their productivity in the workplace. An organization’s system that is not…
Write-Up: Hacking Humans
03 June 2025 Hacking Humans The article Hacking Humans: Protecting Our DNA from Cybercriminals, the author discusses if the digitization of DNA is safe. With the increased popularity of DNA testing services to discover the ethnic and medical background of an individual, DNA is digitized and placed into a database. The author argues that…
Discussion Board 3: Ethical Considerations of CRISPR Gene Editing
03 June 2025 Identify possible ethical considerations: In Malicious Code, the ethical considerations are the potential for hackers to use a person’s DNA to “infect” a computer through the embedding of a malicious code into a DNA sequence. This could make places like labs and health care facilities more prone to hackers. These are places…
Discussion Board 2: Protecting Availability
29 May 2025 As a CISO for a publicly traded company, I am responsible for all of the core functions outlined in the NIST cybersecurity framework. The core functions are identify, protect, detect, respond, and recover. I will implement these core functions to ensure the safety of the organization I responsible for protecting. Identify I…
Write-Up: The CIA Triad
28 May 2025 The CIA Triad The CIA Triad is also known as confidentiality, integrity, and availability. These elements are the crucial cybersecurity needs that are meant to “guide policies for information security within an organization” (Chai, 2023, p. 1). This is not to be confused with the AIC Triad, which is availability, integrity, and…