Discussion 11: Workplace Deviance

In the modern era we store many different types of data onto computers and servers. These types of data can be sensitive information about people, company secrets, and records that people might want to know to exploit the stock for certain companies. This data can be stored all on one computer so the opportunity to…

Discussion 9: The “Short Arm” of predictive knowlege

As Jonas states in the reading, the short arm of human power does not call for the long arm of predictive knowledge. This means that it is hard for people to predict what will exactly happen in the future. This means for the development for cyber-policy and infrastructure we should design it to be changeable…

Discussion 8: Cybersecurity and Criminal Justice

Cybercrime allows for a crime to happen anywhere in the world. This means that a cybercriminal could commit a crime from one country to another, and this makes it harder for investigators to stop them due to national boundaries. This causes traditional law enforcement strategies to fail since the internets borderless nature makes it easy…

Scada Systems: Vulnerabilities and the mitigation of risks

David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology & SocietyDr. Christopher BowmanApril 12, 2026 Critical infrastructure and Vulnerabilities Like with all forms of technology there will always be different types of vulnerabilitiesthat will allow hackers to gain access to it. A lot of main critical infrastructure runs on a systemknown…

Discussion 7: Ethical Considerations of CRISPR Gene Editing

CRISPR gene editing can hold great potentiality of healing the people who may need it. One ethical use of the technology is that this can help treat genetic diseases and greatly increase human health and life expectancy. One problem with it is the off-target effects. The potentiality of a harmful effect can lead to severe…

Hacking Humans: DNA digitization and its consequences

David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology & SocietyDr. Christopher BowmanMarch 29, 2026 DNA digitization is a tool that can help many in the medical field. This type of technology is able to stop other people from getting hurt by serious medical conditions, even finding cure’s to fatal illnesses….

Discussion 6: Malicious Code

Based on the reading for this week, One of the security vulnerabilities in DNA analysis software is the ability to induce basic buffer overflow attacks and this causes digital applications to run useless code. This was possible since the DNA code was able to get access to the shell command, and since this is able…

Discussion 5: NIST Cybersecurity Framework

From the readings of the NIST Cybersecurity Framework, One benefit that organizations can gain from this framework is protection. The NIST framework has one of its core functions to be protection, and this benefits the organization by having safeguards to deal with the Companies Cybersecurity risk’s. The way I would use this at my future…

CIA-Triad: Difference between Authentication and Authorization

David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology & SocietyDr. Christopher BowmanFebruary 22, 2026 What is the CIA Triad Authentication and Authorization is a component of the CIA triad, thus it is important tounderstand the triad. The CIA Triad stands for Confidentiality, Integrity, and Availability.Confidentiality is about how well information…

Discussion 4: Protecting Availability

One protection I would implement to ensure availability of the companies systems would be the protections against a DDOS attack. These attacks overwhelm a target server with a massive amount of traffic, usually from a bot net. The reason I would protect the companies systems is because if this attack is successful then all of…

Discussion 3: The IT Organization

The document describes the necessity of understanding AI tools as essential as a tool is to an engineer. AI provides an enormous library of functionality to the point where many workers will be able to use it in their jobs. This enormous library of functionality can also increase efficiency of those who use it since…

Components of a business in the modern era

David FlowersDepartment of video game development and design, Old Dominion UniversityCYSE-200: Cybersecurity, Technology & SocietyDr. Christopher BowmanFebruary 8, 2026 Other Component of an organization and where do they “fit” One component of a business should be information security. This component wouldmonitor how sensitive information is handled and what employees are able to access/know thebusinesses sensitive…