IT/CYSE 200T Writings

Ethical Considerations of CRISPR Gene Editing

“Our ability to manipulate genetic information has greatly improved over the past decade (or two). As a result of the development of tools such as CRISPR, we now have the possibility of controlling our own or another species’ genetic makeup directly. Nevertheless, there are some ethical considerations to take into account. Some people support CRISPR, while others oppose it. With the current state of our world’s technology, we do not have perfect ways of genetically modifying humans yet. This basically means in order to fine-tune any modifications, we would need to conduct numerous trials. Many test subjects would be involved, usually embryos or fetuses still in the womb. This is how morals and ethical considerations come to play. What happens if the procedure goes wrong? Trial and error is the hallmark of progress, so it is possible for testing subjects to have undesired disabilities, diseases, and side effects. The subject would also not be able to make these decisions themselves. If these fetuses were to be born they would have no choice but to be stuck with harmful effects. You can sort of get an image in your mind for why people may be against it. Conversely, CRISPR could enhance health technology in a huge way. Possibly curing cancer, Eliminating blindness and sickle cell are some of the things we might be able to accomplish through CRISPR. You cannot deny having the ability to do these things will greatly impact our world forever. Currently, this topic is subject to a wide range of questions and debates”

Opportunities for Workplace Deviance – Due 11/13

Cyber Technology has made confidential information being leaked more possible. In the event of somebody in the company leaking sensitive information what do you do?

Confidential Information Leaks & Workplace Deviance

Since more companies are being operated on the internet, more business communications are often through cyber technology.  Research shows that email is the most used business communication device. Links to an external site. Since employees are spending most of their time sending emails or scrolling on their inbox this opens huge opportunity for confidential information being leaked. We can conclude this because the FBI reported that $43 billion in losses are due to business Email Compromise fraud between 2016 and 2021.  Links to an external site.An unauthorized person or party may receive confidential information when a business email is compromised. There can be a significant loss of revenue for your company if information concerning project deals or tenders is leaked. There are often indirect consequences to leaks of information, even if they do not appear to directly harm your company. Your company’s reputation can be harmed if confidential customer information is leaked. The future clients of your company may be apprehensive about working with you.

Locating the source for Confidential Information leaks  

  • Information is shared using non-secure tools (email)
  • Employees stealing company information
  • Employees accidentally sharing confidential information
  • Information accidentally sent to wrong recipients
  • Phishing scamsLinks to an external site.

In an interesting case of Tesla who had an employee leaking private information. Links to an external site. Elon Musk stated on twitter, how they caught the employee “….We sent what appeared to be identical emails to all, but each was actually coded with either one or two spaces between sentences, forming a binary signature that identified the leaker.” If you’re going to operate your business using cyber technology, you must prepare your company for the possiblity workplace deviance. 

Protecting Avilability Discussion Board

CRISTIAN FERNANDEZ

If I were a CISO for a company here are some steps I would do to ensure the protection of our systems. I would implement measures for protection such as the NIST Framework, access control, and two-factor identification. The NIST Framework is basic guidelines that will help the company manage and analyze cybersecurity risks. as well as identify, protect, respond, and detect cyber threats. In order to assess our capabilities, we would have to follow best practices for risk management. In addition to this, access control would help our system by allowing administrators to separate role management from user management. The information is more secure this way. Moreover, it simplifies things so they are easier to understand and control. Employees that are required specific information to do their job is made readily available to only to certain individuals. This would make it easier to pinpoint how a cyberattack occurred if we can pinpoint what type of information was leaked. 2FA also known as 2 Factor Authentication is a basic and easy defense way to secure our system. I believe every company should have at least some type of 2FA. It will require you to prove who you are through at least 2 methods. The customer or employee may be required to verify a code or have a back up security password that will allow them to have access to the system. Having these basic security implementations will some of the things I would do as a CISO.