My Discussions Board Post

  1. In Designing the Public Sphere, Verbeek argues that regulation must adapt as the state’s power weakens and technology becomes more intelligent and interconnected. Traditional laws aren’t enough; technologies now mediate how we interact and make decisions.

Markets and businesses should be regulated economically and based on how their technologies influence public behavior, like how algorithms shape political views. Ethical design standards and algorithm transparency are key.

Individuals and groups also need digital literacy to understand and navigate these systems. Regulation should become more collaborative, involving designers, users, and communities, not just the state.

Reference:

Verbeek, P.-P. (2011). Designing the Public Sphere: Information Technologies and the Politics of Mediation. In Moralizing Technology (pp. 213–232). University of Chicago Press.

2. Cyber technology has made workplace deviance easier by enabling time theft, data theft, cyberloafing, and misuse of company resources. It also allows for online fraud, cyberbullying, and spreading harmful content. These actions can harm productivity, morale, security and morale, and strong policies and monitoring.

3.

The chief information security officer (CISO) of a publicly traded company ensuring system availability is my top priorities. Availability is a key pillar of the CIA triad (Confidentiality, Integrity, and availability) and it loss can greatly impact business operations, revenue, and customer trust. To protect availability I would add the following strategies:

1.  Redundant Infrastructure – I would make sure that critical systems have redundant servers, data centers, and cloud-based backups. This prevents points of failure and allows operations to continue in case of hardware failures or cyber incidents

2. Disaster Recovery and business Continuity Planning – A robust disaster recovery plan that ensures quick recovery from outages, natural disasters, or cyberattacks. And regular testing of DR procedures would be necessary to guarantee effectiveness

3. DDoS Mitigation – Distributed denial of service (DDos) attacks can greatly cripple online services, And implementing network based defenses like firewalls, traffic filtering, and cloud-based DDos Protection.

4. Access controls and least privilege – And limiting user access through role based access control and enforcing the principle of least privilege.

5. Regular patch management – Keeping systems up to date with security patches reduces the chances attackers could exploit.

6. Incident Response Team – A dedicated team with 24/7 monitoring would quickly detect and address the threats.

Leave a Reply

Your email address will not be published. Required fields are marked *