Genome Editing and Ethical Considerations

Genome editing is an emerging technology that can perform loss of function, or gain of function, in basic DNA mapping. This technology can have wonderful effects such as eradicating cancers, birth defects, and other deadly diseases. It can also be used to increase the function of human immune systems which would strengthen one’s ability to…

SCADA Systems: A Critical Vulnerability

Today’s world seems to be increasingly more volatile. There is political unrest in almost every region around the globe and although this has almost always been the case, technology has allowed these conditions to be viewed by more people worldwide. Technology is also a new frontier to the world of warfare which has brought to…

CISO: A Future Plan

A Chief Information Security Officer (CISO) is responsible for all things data/information within an organization. According to CIO.gov, “the agency CISO plays a key role in working with the agency CIO to ensure information security requirements are properly implemented.” (n.d.). Meaning that this is the person that will be also handling the budget when allocating…

The Fundamental Principals of Cybersecurity: Authentication, Authorization and the CIA Triad

Confidentiality, Integrity, and availability – colloquially known as the CIA triad – in conjunction with authentication and authorization make up the foundation of information security. This guidance helps organizations formulate security plans, policies, and procedures that enable them to keep safe the information of their customers as well as their own networks. Confidentiality, which is…