In the modern era we store many different types of data onto computers and servers. These types of data can be sensitive information about people, company secrets, and records that people might want to know to exploit the stock for certain companies. This data can be stored all on one computer so the opportunity to…
Discussion 10: From Verbeek’s writing Designing the Public Sphere: Information Technologies and the Politics of Mediation
As Verbeek states in the reading intelligification is when more items that did not have technology become integrated with it, such as a hospital bed now detecting when a patient falls out of it. This intelligification can happen to many different parts of the public sphere such as markets and businesses, this then causes questions…
Discussion 9: The “Short Arm” of predictive knowlege
As Jonas states in the reading, the short arm of human power does not call for the long arm of predictive knowledge. This means that it is hard for people to predict what will exactly happen in the future. This means for the development for cyber-policy and infrastructure we should design it to be changeable…
Discussion 8: Cybersecurity and Criminal Justice
Cybercrime allows for a crime to happen anywhere in the world. This means that a cybercriminal could commit a crime from one country to another, and this makes it harder for investigators to stop them due to national boundaries. This causes traditional law enforcement strategies to fail since the internets borderless nature makes it easy…
Scada Systems: Vulnerabilities and the mitigation of risks
David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology & SocietyDr. Christopher BowmanApril 12, 2026 Critical infrastructure and Vulnerabilities Like with all forms of technology there will always be different types of vulnerabilitiesthat will allow hackers to gain access to it. A lot of main critical infrastructure runs on a systemknown…
Discussion 7: Ethical Considerations of CRISPR Gene Editing
CRISPR gene editing can hold great potentiality of healing the people who may need it. One ethical use of the technology is that this can help treat genetic diseases and greatly increase human health and life expectancy. One problem with it is the off-target effects. The potentiality of a harmful effect can lead to severe…
Hacking Humans: DNA digitization and its consequences
David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology & SocietyDr. Christopher BowmanMarch 29, 2026 DNA digitization is a tool that can help many in the medical field. This type of technology is able to stop other people from getting hurt by serious medical conditions, even finding cure’s to fatal illnesses….
Discussion 6: Malicious Code
Based on the reading for this week, One of the security vulnerabilities in DNA analysis software is the ability to induce basic buffer overflow attacks and this causes digital applications to run useless code. This was possible since the DNA code was able to get access to the shell command, and since this is able…
Discussion 5: NIST Cybersecurity Framework
From the readings of the NIST Cybersecurity Framework, One benefit that organizations can gain from this framework is protection. The NIST framework has one of its core functions to be protection, and this benefits the organization by having safeguards to deal with the Companies Cybersecurity risk’s. The way I would use this at my future…
CIA-Triad: Difference between Authentication and Authorization
David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology & SocietyDr. Christopher BowmanFebruary 22, 2026 What is the CIA Triad Authentication and Authorization is a component of the CIA triad, thus it is important tounderstand the triad. The CIA Triad stands for Confidentiality, Integrity, and Availability.Confidentiality is about how well information…
Discussion 4: Protecting Availability
One protection I would implement to ensure availability of the companies systems would be the protections against a DDOS attack. These attacks overwhelm a target server with a massive amount of traffic, usually from a bot net. The reason I would protect the companies systems is because if this attack is successful then all of…
Discussion 3: The IT Organization
The document describes the necessity of understanding AI tools as essential as a tool is to an engineer. AI provides an enormous library of functionality to the point where many workers will be able to use it in their jobs. This enormous library of functionality can also increase efficiency of those who use it since…
Components of a business in the modern era
David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology & SocietyDr. Christopher BowmanFebruary 8, 2026 Other Component of an organization and where do they “fit” One component of a business should be information security. This component wouldmonitor how sensitive information is handled and what employees are able to access/know thebusinesses sensitive…
Discussion Week 2: Cybersecurity best practices are not just technical issues
Cybersecurity and privacy best practices are not just technical issues since privacy also relies on other people inside of the company to keep the sensitive information that they know quite. One example is that I had a friend in a Internship during a break from school, one of the heads from another department told one…