Article Review: De re/de dicto distinction: A Logicians’ Perspective on Data AnonymitySource: Journal of CybersecurityLink to Article: https://doi.org/10.1093/cybsec/tyae0251. Relationship to Social Science PrinciplesThis article looks at the difference between “de re” (about the thing itself) and “de dicto”(about the statement) when it comes to data anonymity. It ties this distinction to socialscience by exploring how…
200T discussion protecting availability
As the Chief Information Security Officer of a publicly traded company, keeping our systems up and running is a top priority. Building on some basic strategies, here are additional steps I’ll take to boost our system’s resilience:Network Segmentation- By splitting our network into separate segments, we can prevent issues in one area from affecting the…
Cyber roles and responsibilities
The Security Control Assessor is a crucial member of a cybersecurity team responsible for evaluating the effectiveness of an organization’s security measures. This role involves conducting a thorough assessment of the managerial, operational, and technical security controls used within a system. The SCA’s job is to determine if these controls are correctly implemented, working as…
IDS mod.3 reflection
I think each of the topics listed meets the standard in different ways: 1. The psychological dimension of Alzheimer’s disease is interdisciplinary because it involves psychology, which examines how the disease affects memory, behavior, and emotions, and neurology, which focuses on the brain’s role in the disease. It could also connect to sociology, looking at…
IDS mod.2 reflection
1. Offshore drilling for oil and gas Environmental Science: Focuses on the negative effects on marine ecosystems, such as habitat destruction, oil spills, and pollution that harm fish, birds, and other wildlife. It also considers how burning fossil fuels from offshore drilling contributes to climate change by increasing greenhouse gas emissions. Economics: Examines both the…
IDS mod.1 reflection
Before reading this week’s material, I understood that Interdisciplinary Studies (IDS) involved integrating knowledge from multiple disciplines to solve complex problems. I recognized its importance in fields like cybersecurity, where threats often require expertise in technology, psychology, and law. However, I hadn’t fully considered the structured process behind IDS or how it addresses gaps between…