Author: bcree002
Designing the Public Sphere: Information Technologies and the Politics of Mediation
Based on the technological race towards developing innovations that lessen the involvement of human actions but rather actions created by devices instead, human involvement needs to be kept at the same level of advancements as technology. Without this, human interactions would eventually be consumed. Think of AI as an example, it is one of many…
Going on a Job Hunt
With all of the 50 jobs listed, each of them has the similarity of knowledge involving the scenarios in any given situation that an IT professional should know how to do. All of the positions have to perform their job at an expertise level without any room for error. In the position of being an…
Protecting Availability
If I were the CISO, the first and foremost implementations would involve training my employees. Testing them based on their knowledge of the work and training them on how to handle certain types of attacks in itself will boost the protections of my company’s security system. Live Fire Training exercises will also help them recognize…
The “Short Arm” of Predictive Knowledge
Approaching the development of cyber-policy and infrastructure based on short arm predictive knowledge, the advancement of technology has introduced a society of actions where consequences and objects can no longer be supported by ethics. Ethics like justice, charity, and honesty are being overshadowed by a world of ineffective doer, deed, and effect. As a result,…
The Human Factor in Cybersecurity
How would you allocate the funds of being a Chief Information Security Officer (CISO) between the training and additional cybersecurity technology with a limited budget? Importance of Training Training is important for employees because it teaches the vital defensive measures to protecting valued data and keeping the company’s infrastructure secure. Employees’ themselves serve as a…
Opportunities of Workplace Deviance
Advancements in cyber technology have allowed companies to be able to use unethical practices that have resulted in workplace deviance. The more creative functions developed within cyber technology have allowed more opportunities for it. One opportunity would be how companies use computers with algorithms to unethically compete against humans in the open market. It’s unfair…
The CIA Triad
The CIA Triad What is the CIA Triad? The CIA Triad is a model of policies followed by organizations for purposes ofinformation security. It contains the trio of policies: confidentiality, integrity, and availability, allof which serve as the important foundation for every IT department in an organization.Understanding the meaning of each policy and its significance…
SCADA Systems
SCADA Systems What are SCADA Systems? SCADA (also known as supervisory control and data acquisition) is a system within an infrastructure that generally handles the processes of production and gathers essential real-time data which is able to be reviewed by a human operator. SCADA can be integrated into components of the infrastructure such as computers…
CRISPR Gene Editing
Although in hindsight, CRISPR gene editing seems like a great invention because it can prevent certain genetic disorders, it’s still a relatively new process with its flaws. For example, one of the ethical considerations is whether it can be used be hackers to match the identity of someone. This currently raises the risk of hackers…