With technology always evolving and changing, states are slowly losing the ability to be able to monitor the way that the organizations and individuals decide to use the technology that have available. There needs to be regulations and laws that prevent people from being able to use something like AI to be used in the…
Author: cgreg017
Discussion Board: The “Short Arm” of Predictive Knowledge
The “Short Arm” of predictive knowledge is telling us about being cautious about the future of technology, because technology is always growing and evolving. We can’t see into the future to know what will happen, we don’t know how AI will be like in the future, and we don’t know how hackers and the threats…
Discussion Board: Opportunities for Workplace Deviance
Cyber technology has paved a way for workplace deviance by allowing more ways for people to gain access to private information and the ability to interact with people a lot more. Workplace Deviance has seen an increase in incidents since the ability of working from home has allowed people to gain access to stuff in…
Discussion Board: Ethical Considerations of CRISPR Gene Editing
The ethical concern that comes with BioCybersecurity is the fact that it puts people in a very dangerous situation that potentially wont be able to be solved; like DNA being stolen. I feel like it’s a very high risk even if it can help with solving medical problems that have not been solved or takes…
Discussion Board: Protecting Availability
As a CISO I would set up a strategy to communicate easier and faster across the organization to maintain security protections of assets in different departments and to be able to communicate and contain any threats that will pose a threat to the organization and its systems. Being able to implement a strategy that will…
Discussion Board: The NIST Cybersecurity Framework
Organizations benefit by using it for cost efficiency, timely risk management, and for them to be able to incorporate it into the specific organizations needs. The Framework allows for business to be able to implement it into the organization easily by allowing them to build it around the organizational structure or improving on the already…
Analytical Paper
The CIA Triad (Confidentiality, Integrity, Availability) article explains what it is, how it works, and why it’s important. CIA Triad is the model guide for Cybersecurity policies that is universally agreed and followed on. The CIA Triad is a very simple model that makes understanding what should be followed, even though there is an argument…
Human Factors in Cybersecurity
When looking at all of the different views of human contribution to cyber threats, we see that humans contribute in a lot of different ways whether it be for a good thing or a bad thing. A lot of contributions to cyber threats range from different age groups, it differs between White Hat Hackers and…
Attack on Availability
Attack on Availability happens all the time, with some of the most notable attacks being DDos attacks and ransomware. These attacks are done to prevent services from being available to people and to find exploits in services while they are down. Cloudflare recently had defended against a massive 7.3 tbps DDos attack, and in 2014…
SCADA Systems
The SCADA article talks about the functions and the history of the system that has been used to control infrastructure and how the different parts of the system are controlled. SCADA (Supervisory Control and Data Acquisition) involves a group of systems that is a part of the ICS (industrial control systems) that is a central…