Discussion Board: Ethical Considerations of CRISPR Gene Editing

For our discussion board, we are asked about possible ethical considerations and explain your position. An ethical concern is that since attacks like these are possible, a lab that sues similar or the same equipment if unsecured could be used for a malicious purpose, such as using DNA sequencing to exploit software. My position in…

The “Short Arm” of Predictive Knowledge

To answer the question of how we can approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge. The first way to approach cyber policy and infrastructure is to have a precautionary principle that should safeguard against the worst-case scenarios even if that event is something that is unlikely to occur….

Exploring Attack on Availability

In this write-up, I will talk about the vulnerabilities that are associated with critical infrastructure systems and the role SCADA applications play in mitigating these risks. So I will talk about what are critical infrastructure systems, which are systems and things like networks and assets that are vital to running your everyday things like water…

Opportunities for Workplace Deviance

We are asked how cyber technology created opportunities for workplace deviance. To start off, the first way that cyber technology has created opportunities for workplace deviance is through anonymity. This is important because people are willing to take part in more malicious activities if no one is able to see what they are doing online….