{"id":155,"date":"2025-02-01T22:54:04","date_gmt":"2025-02-01T22:54:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=155"},"modified":"2026-02-27T18:33:27","modified_gmt":"2026-02-27T18:33:27","slug":"l_t","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/christosdotson1\/l_t\/","title":{"rendered":"Course Projects"},"content":{"rendered":"\n<p>Discussions: <\/p>\n\n\n\n<p>Question: Based on your readings related to the BioCybersecurity section of this course, identify possible ethical considerations and explain your position.&nbsp;<\/p>\n\n\n\n<p>The articles&nbsp;describe&nbsp;emerging threats at the&nbsp;biology-cybersecurity&nbsp;front. The Forbes article, Hacking Humans: Protecting Our DNA from&nbsp;Cybercrime,&nbsp;discusses&nbsp;the&nbsp;risk&nbsp;of digitizing human DNA&nbsp;as&nbsp;its&nbsp;worth&nbsp;as the&nbsp;most&nbsp;personally identifiable information (PII)&nbsp;out there.&nbsp;Consumer DNA testing&nbsp;gives&nbsp;scientific&nbsp;and&nbsp;health&nbsp;advancements,&nbsp;but&nbsp;the risk of&nbsp;cyberattack&nbsp;and&nbsp;misuse&nbsp;of&nbsp;such&nbsp;personal&nbsp;information&nbsp;is&nbsp;disquieting. The article warns that, unlike traditional identity theft, stolen DNA&nbsp;cannot&nbsp;be&nbsp;reversed&nbsp;and could&nbsp;potentially&nbsp;be&nbsp;used&nbsp;in&nbsp;a&nbsp;way we cannot even imagine. The TechCrunch article, Malicious Code&nbsp;Injected&nbsp;into DNA&nbsp;Compromises&nbsp;the Computer&nbsp;Used&nbsp;to&nbsp;Read&nbsp;it,&nbsp;discloses&nbsp;an even more&nbsp;advanced&nbsp;security&nbsp;risk\u2014embedding malicious code into DNA&nbsp;strands&nbsp;to exploit&nbsp;loopholes&nbsp;in sequencing&nbsp;programs.&nbsp;The&nbsp;proof&nbsp;of&nbsp;concept&nbsp;shows&nbsp;that&nbsp;with&nbsp;the convergence of&nbsp;digital and biological domains&nbsp;comes&nbsp;the creation of&nbsp;new&nbsp;points&nbsp;of&nbsp;vulnerability.&nbsp;Collectively, these articles&nbsp;emphasize&nbsp;the urgent need&nbsp;of&nbsp;robust cybersecurity&nbsp;for&nbsp;genomics. As technology advances,&nbsp;it&nbsp;is paramount that&nbsp;digital DNA&nbsp;remains&nbsp;guarded&nbsp;to prevent irreversible breaches.&nbsp;<\/p>\n\n\n\n<p>Question:  You are the&nbsp;<strong>CISO&nbsp;<\/strong>for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?<\/p>\n\n\n\n<p>As a CISO I would look to make sure redundancy and failover mechanics are put in place. With this in mind I would be able to implement systems and networks that would allow continuity. This could be as great as buying more geological sites where we could build data centers to ensure that there is no stoppage due to disaster. With failover systems being able to seamlessly connect to backup systems to keep the flow continuing. With Cyberattacks rising every day it is important to ensure user data security. With all the given cyberattacks we will implement DDoS migration solutions that can absorb malicious traffic before it can reach vital systems. With that being said data integrity is essential. We would have multiple offsite backups that would be tested routinely to ensure that they can be restored quickly. With backups being essential we want to make sure that none of these systems would be breached with that being said we want to implement continuous monitoring to stop all threats at the start of the accident. Lastly we would have various patches to ensure that all security measure are up to date and meet the standard for user security. <\/p>\n\n\n\n<p>Question:  How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge?<\/p>\n\n\n\n<p>In&nbsp;the&nbsp;light&nbsp;of&nbsp;the limits of&nbsp;predictive knowledge, cyber-policy and infrastructure&nbsp;have&nbsp;to&nbsp;be&nbsp;built&nbsp;for&nbsp;resilience,&nbsp;learnability, and&nbsp;adaptability,&nbsp;in&nbsp;ongoing&nbsp;revision.&nbsp;Not&nbsp;locked-in,&nbsp;futurized&nbsp;architectures, we&nbsp;will&nbsp;need&nbsp;to&nbsp;possess&nbsp;modular&nbsp;designs&nbsp;improving&nbsp;through&nbsp;periodic revisit,&nbsp;feedback, and&nbsp;foresight.&nbsp;We&nbsp;have&nbsp;to&nbsp;emphasize&nbsp;bringing&nbsp;into&nbsp;place&nbsp;infrastructure that&nbsp;is&nbsp;secure&nbsp;against,&nbsp;as&nbsp;well as recovered&nbsp;from,&nbsp;assault,&nbsp;improve&nbsp;across-sector&nbsp;participation, and&nbsp;solidly&nbsp;effective&nbsp;ethical&nbsp;guards&nbsp;for civil&nbsp;freedoms. Scenario planning, public-private partnerships, and institutionalized foresight can&nbsp;navigate uncertainty, while&nbsp;open, participatory&nbsp;government&nbsp;guarantees&nbsp;that&nbsp;policies&nbsp;are&nbsp;responsible&nbsp;and responsive to emerging threats. We also can put in fall safes incase of emergency or risks of exposure.&nbsp;<\/p>\n\n\n\n<p>Labs Done For CYSE 270 <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Linux-Assingment-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Linux-Assingment-2.\"><\/object><a id=\"wp-block-file--media-3406a434-181a-4da4-a661-518810fa3ca4\" href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Linux-Assingment-2.pdf\">Linux-Assingment-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Linux-Assingment-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3406a434-181a-4da4-a661-518810fa3ca4\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Linux-Assingment-4.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Linux-Assingment-4.\"><\/object><a id=\"wp-block-file--media-7eee0a5a-56c5-4657-af3b-655426e5f159\" href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Linux-Assingment-4.pdf\">Linux-Assingment-4<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Linux-Assingment-4.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7eee0a5a-56c5-4657-af3b-655426e5f159\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assignment-5.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-5.\"><\/object><a id=\"wp-block-file--media-b519575c-e36b-4947-83ae-b338aef4f5d8\" href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assignment-5.pdf\">Assignment-5<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assignment-5.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b519575c-e36b-4947-83ae-b338aef4f5d8\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assingment-6.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assingment-6.\"><\/object><a id=\"wp-block-file--media-61149f3c-48f5-4641-a5e9-c06b7a6fcba8\" href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assingment-6.pdf\">Assingment-6<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assingment-6.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-61149f3c-48f5-4641-a5e9-c06b7a6fcba8\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assingment-7.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assingment-7.\"><\/object><a id=\"wp-block-file--media-6f6eba36-df78-4e23-889e-e4930706be66\" href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assingment-7.pdf\">Assingment-7<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assingment-7.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6f6eba36-df78-4e23-889e-e4930706be66\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assingment-8.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assingment-8.\"><\/object><a id=\"wp-block-file--media-3fed38ef-f6cc-460e-9f7c-0cd457e59d96\" href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assingment-8.pdf\">Assingment-8<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assingment-8.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3fed38ef-f6cc-460e-9f7c-0cd457e59d96\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assignment-9.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-9.\"><\/object><a id=\"wp-block-file--media-85f6fd99-dc5e-463c-a536-c3345a79fe9c\" href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assignment-9.pdf\">Assignment-9<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assignment-9.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-85f6fd99-dc5e-463c-a536-c3345a79fe9c\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assignment-10.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-10.\"><\/object><a id=\"wp-block-file--media-4450516b-7118-4592-b43d-687a1795842c\" href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assignment-10.pdf\">Assignment-10<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-content\/uploads\/sites\/38391\/2025\/11\/Assignment-10.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4450516b-7118-4592-b43d-687a1795842c\">Download<\/a><\/div>\n\n\n\n<p>Public Speaking <\/p>\n\n\n\n<p>Persuasive Speech: <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discussions: Question: Based on your readings related to the BioCybersecurity section of this course, identify possible ethical considerations and explain your position.&nbsp; The articles&nbsp;describe&nbsp;emerging threats at the&nbsp;biology-cybersecurity&nbsp;front. The Forbes article, Hacking Humans: Protecting Our DNA from&nbsp;Cybercrime,&nbsp;discusses&nbsp;the&nbsp;risk&nbsp;of digitizing human DNA&nbsp;as&nbsp;its&nbsp;worth&nbsp;as the&nbsp;most&nbsp;personally identifiable information (PII)&nbsp;out there.&nbsp;Consumer DNA testing&nbsp;gives&nbsp;scientific&nbsp;and&nbsp;health&nbsp;advancements,&nbsp;but&nbsp;the risk of&nbsp;cyberattack&nbsp;and&nbsp;misuse&nbsp;of&nbsp;such&nbsp;personal&nbsp;information&nbsp;is&nbsp;disquieting. The article warns that, unlike traditional identity&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/christosdotson1\/l_t\/\">Read More<\/a><\/div>\n","protected":false},"author":30495,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-json\/wp\/v2\/pages\/155"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-json\/wp\/v2\/users\/30495"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-json\/wp\/v2\/comments?post=155"}],"version-history":[{"count":6,"href":"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-json\/wp\/v2\/pages\/155\/revisions"}],"predecessor-version":[{"id":345,"href":"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-json\/wp\/v2\/pages\/155\/revisions\/345"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/christosdotson1\/wp-json\/wp\/v2\/media?parent=155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}