{"id":332,"date":"2024-04-17T18:13:22","date_gmt":"2024-04-17T18:13:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/?p=332"},"modified":"2024-04-17T18:13:22","modified_gmt":"2024-04-17T18:13:22","slug":"final-submission","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/2024\/04\/17\/final-submission\/","title":{"rendered":"Final Submission"},"content":{"rendered":"\n<p>Ethical Considerations of CRISPR Gene Editing:<\/p>\n\n\n\n<p>Ensuring privacy and data security in BioCybersecurity means keeping sensitive biological and medical information safe from unauthorized access and misuse. Ethical concerns include getting informed consent, minimizing risks, and preventing discrimination related to genetic information. This involves using strong security measures like encryption and access controls, as well as being clear about why data is collected and how it&#8217;s used. Following rules and regulations like HIPAA and GDPR is important for accountability and oversight. It&#8217;s crucial for everyone involved\u2014researchers, policymakers, and individuals\u2014to work together to balance the benefits of using biological data for cybersecurity with protecting people&#8217;s privacy and rights.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Write Up Scada Systems:<\/p>\n\n\n\n<p>BLUF:<br>Critical infrastructure systems are increasingly vulnerable to cyber threats, posing significant<br>risks to public safety and national security. SCADA (Supervisory Control and Data Acquisition)<br>applications play a crucial role in mitigating these risks by providing real-time monitoring,<br>control, and automation of industrial processes. However, SCADA systems themselves are not<br>immune to vulnerabilities and require robust cybersecurity measures to safeguard against<br>potential attacks.<br>Introduction:<br>Modern societies heavily rely on critical infrastructure systems spanning sectors such as energy,<br>water, transportation, and telecommunications. These systems are indispensable for societal<br>functioning. However, the growing interconnectivity and dependence on digital technologies<br>have rendered them susceptible to cyber threats. This document delves into the vulnerabilities<br>inherent in critical infrastructure systems and examines how SCADA applications contribute to<br>tackling these vulnerabilities.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Vulnerabilities in Critical Infrastructure Systems:<br>Interconnectedness: The integration of operational technology (OT) with information technology<br>(IT) systems has expanded the attack surface of critical infrastructure. Interconnected networks<br>increase the potential entry points for cyber attackers.<br>Legacy Systems: Many critical infrastructure systems rely on outdated and legacy technologies<br>that may lack built-in security features. These systems are often challenging to patch or upgrade,<br>leaving them susceptible to exploitation.<br>Human Factors: Human error, negligence, or malicious insider actions can compromise the<br>security of critical infrastructure systems. Inadequate training, lax security protocols, and<br>insufficient access controls contribute to the human element of vulnerability.<br>Supply Chain Risks: Dependencies on third-party vendors for components, software, and<br>services introduce supply chain risks. Compromised or malicious components can infiltrate<br>critical infrastructure systems, leading to potential disruptions or sabotage.<br>Role of SCADA Applications in Mitigating Risks:<br>Real-time Monitoring: SCADA systems provide real-time monitoring of industrial processes,<br>allowing operators to detect anomalies or suspicious activities promptly. Early detection enables<br>proactive responses to potential threats.<\/p>\n\n\n\n<p>Remote Control and Automation: SCADA applications enable remote control and automation of<br>critical infrastructure operations, reducing the need for human intervention in hazardous<br>environments. Automation can minimize the impact of cyber incidents by isolating affected<br>systems and executing predefined response protocols.<br>Data Integrity and Authentication: SCADA systems ensure data integrity and authentication<br>through encryption, digital signatures, and secure communication protocols. Protecting the<br>integrity of data transmitted between sensors, controllers, and central servers is essential for<br>maintaining the reliability and trustworthiness of critical infrastructure operations.<br>SCADA Vulnerabilities and Cybersecurity Measures:<br>Software Vulnerabilities: SCADA applications may contain software vulnerabilities that can be<br>exploited by cyber attackers. Regular software updates, patch management, and vulnerability<br>assessments are essential for addressing these weaknesses.<br>Network Security: SCADA networks must be segregated from other IT networks to prevent<br>unauthorized access and lateral movement by attackers. Firewalls, intrusion detection systems<br>(IDS), and virtual private networks (VPN) can enhance the security of SCADA communications.<br>Access Control: Implementing strong access controls, such as role-based authentication and least<br>privilege principles, helps prevent unauthorized users from accessing critical infrastructure<br>systems. Regular audits and monitoring of user activities are necessary to detect and respond to<br>suspicious behavior.<br>Conclusion:<\/p>\n\n\n\n<p>Securing critical infrastructure systems is imperative to safeguard public safety and national<br>security. Although SCADA applications are pivotal for overseeing and managing industrial<br>operations, they also introduce vulnerabilities of their own. To fortify protection against cyber<br>threats, organizations must adopt robust cybersecurity strategies. These encompass frequent<br>updates, segmentation of networks, stringent access controls, and comprehensive employee<br>training. Such measures bolster the defense of critical infrastructure against potential cyber<br>intrusions.<br>References:<br>Ginter, A., Liu, D., &amp; Skavantzos, A. (2015). SCADA Security: What&#8217;s Broken and How to Fix<br>It. Syngress.<br>Whitman, A., &amp; Mattord, H. (2016). Management of Information Security. Cengage Learning.<br>Last, M., Anuar, N. B., &amp; Alizadeh, M. (2021). SCADA systems: A review on architectures,<br>threats, and mitigation techniques. Computers &amp; Security, 105, 102218<\/p>\n\n\n\n<p>The Human Factor In Cybersecurity:<\/p>\n\n\n\n<p><br>Chief Information Security Officers (CISOs) have the responsibility of protecting their<br>organizations from threats to their cybersecurity. Often CISOs find themselves with budget<br>limitations. One of the most important things that a CISO must do is balance the budget between<br>cybersecurity technology and employee training. These are both equally as important as the<br>other.<br>Roughly 40% of the budget should be allocated to employee training and awareness programs.<br>Employees are often the weakest link in cybersecurity. Investing in comprehensive training<br>programs can empower them to recognize and mitigate cyber threats effectively. These programs<br>aim to educate employees about cybersecurity risks and best practices, reducing the likelihood of<br>successful cyberattacks. Regular training sessions and ongoing education efforts are essential<br>components of this strategy.<br>Roughly another 40% of the budget should be dedicated to implementing essential cybersecurity<br>technologies. This includes antivirus software, firewalls, and intrusion detection systems, which<br>provide fundamental protection against common threats. These technologies form the foundation<br>of the organization&#8217;s security infrastructure. Antivirus software stands as one of the frontline<br>defenses against malicious software and malware that could infiltrate the organization\u2019s systems.<\/p>\n\n\n\n<p>Firewalls are another type of barrier that will wall off the organization\u2019s internal network and the<br>external world of the internet. By enforcing access control policies and blocking malicious<br>traffic, firewalls are effectively the shield of the organization\u2019s entire network.<br>All together antivirus, firewalls, and other intrusion detection systems, these form the foundation<br>of the organizations cybersecurity, providing protection against threats such as malware,<br>unauthorized access attempts, and network intrusions. Investing a fair amount into these<br>technologies ensures a defense that will safeguard critical assets and maintain data integrity. This<br>preserves the organization\u2019s reputation in cyber threats.<br>Now, the remaining 20% of the budget should be reserved for exploring emerging cybersecurity<br>technologies and incident response preparedness. This involves piloting new security solutions<br>and developing incident response plans to minimize the impact of security incidents. Investing in<br>incident response capabilities enhances the organization&#8217;s ability to respond effectively to cyber<br>threats.<br>By finding the right balance between employee training and cybersecurity technology,<br>organizations can fully maximize their cybersecurity resilience within limited budgets. Investing<br>in employee education ensures security-conscious culture, while essential security technologies<br>provide basic protection. Exploring emerging technologies and enhancing incident response<br>capabilities further strengthens the organization&#8217;s security. Overall, this approach enables CISOs<br>to effectively manage cybersecurity risks while optimizing resources.<\/p>\n\n\n\n<p>References<br>Harvard Business Review. (2023, May). Where to Focus Your Company&#8217;s Limited<br>Cybersecurity Budget. Retrieved from https:\/\/hbr.org\/2023\/05\/where-to-focus-your-companys-<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/canvas.odu.edu\/courses\/153085\/discussion_topics\/800121?module_item_id=5837529#\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethical Considerations of CRISPR Gene Editing: Ensuring privacy and data security in BioCybersecurity means keeping sensitive biological and medical information safe from unauthorized access and misuse. Ethical concerns include getting informed consent, minimizing risks, and preventing discrimination related to genetic information. This involves using strong security measures like encryption and access controls, as well as&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/2024\/04\/17\/final-submission\/\">Read More<\/a><\/div>\n","protected":false},"author":28486,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/wp-json\/wp\/v2\/posts\/332"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/wp-json\/wp\/v2\/users\/28486"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/wp-json\/wp\/v2\/posts\/332\/revisions"}],"predecessor-version":[{"id":346,"href":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/wp-json\/wp\/v2\/posts\/332\/revisions\/346"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/wp-json\/wp\/v2\/media?parent=332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/wp-json\/wp\/v2\/categories?post=332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cgrel001cyse200t\/wp-json\/wp\/v2\/tags?post=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}