Discussion posts in 200T
You are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?
I would implement redundant systems with failover mechanisms to keep operations running during failures. Regular backups following the 3-2-1 rule would ensure quick data recovery. A solid disaster recovery plan (DRP) and business continuity plan (BCP) would minimize downtime after disruptions. To prevent DDoS attacks, I’d use firewalls, traffic filtering, and DDoS protection services. High availability (HA) architectures like load balancers and microservices would reduce single points of failure. Lastly, access controls, multi-factor authentication (MFA), and 24/7 monitoring would prevent unauthorized access and allow quick responses to incidents, ensuring systems remain secure and available.
Ethical Considerations of CRISPR Gene Editing
Based on your readings related to the BioCybersecurity section of this course, identify possible ethical considerations and explain your position.
BioCybersecurity presents serious ethical concerns, especially regarding privacy, security, and the potential misuse of genetic data. One major issue is that malicious code can be embedded in DNA sequences, infecting computers that analyze them. This could allow hackers to manipulate genetic data, leading to identity theft, altered research results, or unauthorized surveillance. Another concern is the security of genetic information. As DNA sequencing becomes more common, the risk of cyberattacks increases. If criminals gain access to genetic data, they could use it for discrimination in jobs, health insurance, or even bioweapon development. The NIST IR 8432 report stresses the need for stronger security measures like encryption and restricted access to protect this sensitive data. I believe BioCybersecurity should be treated as seriously as other cyber threats. Strong regulations and ethical guidelines are needed to prevent misuse. Addressing these risks now is crucial to protecting both individuals and society from potential harm.
Opportunities for Workplace Deviance
How has cyber technology created opportunities for workplace deviance?
Cyber technology has made it easier for employees to break workplace rules and engage in deviant behavior. With the rise of remote work, personal devices, and online tools, workers can act more privately and avoid being caught by supervisors. This means they might steal sensitive information, waste time on personal activities during work hours, or ignore security rules. The ability to use digital systems anonymously also opens up opportunities for things like fraud or data manipulation. While technology helps increase productivity, it also makes it easier for employees to misuse company resources without getting caught, creating new risks for businesses.