Analysis of the social meaning and impactof cybersecurity systems

Before considering how cybersecurity systems bring meaning to our social interactionsand their value within technological environments, it would first be valuable to discuss some oftheir guiding principles to better attain an understanding of them. The CIA Triad lays some ofthe groundwork for a foundational understanding of cybersecurity professionals and their goals.Cybersecurity principles also play a…

Criminological analysis of Blue Streak 

Miles Logan, a skilled jewel thief who stashed his diamond in the air ducts of a building under construction which would later become a police station, served time behind bars for his thievery. Though Blue Streak (1999) is an action– comedy movie, it can be examined through a criminological lens to gain insight into the…

The attack coming to eat Availability – Ransomware 

Ransomware has teeth, and in the evolving landscape of cyber-security, few attacks pose as serious a threat to availability as Ransomware. A form of malware that is specifically designed to disrupt, damage, or obtain unauthorized access, ransomware is a type of software that directly attacks an organization’s ability to operate. Attackers utilizing this method don’t…

Future policy with the short arm of Predictive Knowledge 

Han’s Jonas paper, “Technology and Responsibility” is a call to action for the reader to reassess ethical considerations given how far reaching, permanent, and the scale of modern human actions. His metaphor on the short arm of tech reminds us to consider the potential long-term consequences of our actions as technology continues to race forward….

How SCADA mitigates vulnerabilities in critical infrastructure 

Supervisory Control and Data Acquisition (SCADA), is a centralized system that is used to both monitor and control Industrial systems and processes. It consists of both the Human-Machine-Interface (HMI) and detection monitoring systems to provide real-time control and monitoring over their processes. Examples of SCADA use include water treatment plants, power generation facilities, pipelines, manufacturing,…

A review of Hacking Humans 

The article on Hacking Humans: Protecting our DNA from cybercriminals brings about valid concerns such as the risk of our DNA profile being acquired by unauthorized individuals as the ultimate source of personal identifiable information, as well as its inherent permanence unlike that of a social security card which could be reissued, not to mention…

Ethical considerations of CRISPR Gene editing in the context of BioCybersecurity 

With the digitalization of our most permanent form of identity, deoxyribonucleic acid (DNA), the blueprint of our existence, we must carefully consider novel vulnerabilities. As professionals, we are ethically obligated to explore new threat vectors and take appropriate action to mitigate these risks. A key consideration in the security of any system is that all input…

Protecting Availability in Critical Infrastructure

As the CISO of a publicly traded company, I would follow the NIST framework: Identify, protect, detect, respond, and recover. I would direct my department to inventory all of their equipment and ensure security updates and hardware replacement occur on a regular schedule. I would also assemble a team to perform risk assessments and classify…

The CIA Triad and Access Control principles 

Sometimes referred to as the AIC to avoid confusion with the CIA Agency, Accessibility, Integrity, and Confidentiality form the backbone of cybersecurity, ensuring data is protected, accurate, and available only to those it should be in a timely manner. Confidentiality are rules that limit access to information, Integrity assures that information is trustworthy and accurate,…

Components of a business

In addition to the “typical business layout,” one will find many other entities that significantlyadd to the overall success of an operating business, such as Technical Support, Legal, Supply chain Management, Research and Development, and Operations. After realizing the typical structure is moreof a guideline rather than a set-in-stone way to organize a business, the…