Ethan Vollbrecht – Workplace Deviance Discussion board
Workplace deviance can range from many things, but in the context of cybersecurity, workplace deviance could be giving away passwords, playing pranks on coworkers, and tampering with company property.
The definition of workplace deviance is any behavior in the workplace that is considered insubordinate or sabatoging to the company. This can include not following instructions, aggressive behavior towards other employees or just simple laziness. In the case of cyber technology, laziness can extend to not responding to threats fast enough and leaking passwords on the internet. Simple things that could be done in any work place.
There are far more ways cyber technology has created opportunities for deviance with the introduction of working from home. Working from home introduces several opportunities for workplace deviance. You can ignore your boss easier, since he isn’t talking right to you, pretend your wi-fi is disconnecting and many more things.
Scott, Sherrie. “Disrespectful Behavior in the Workplace.” Small Business – Chron.com, Chron.com, 21 Nov. 2017, https://smallbusiness.chron.com/disrespectful-behavior-workplace-10754.html.
What is the CIA Triad?
The CIA Triad is a framework for companies to guide and protect security and
intelligence within the company. The letters in CIA stand for Confidentiality, Integrity, and
Availability.
Confidentiality
Confidentiality is how secure data and information is kept inside a company.
Confidentiality is giving authorization only to people who need the information to
perform their jobs. For example, people who work in accounting will only be given
information needed to do their job, such as bank notes, tax invoices etc.
Integrity
Integrity is proof that the data your company owns is trustworthy, reliable and
accurate. It is how the company makes sure they are authentic and trustworthy. If
information your company gives out does not have integrity, people will stop coming to
use your company’s services. For example, if a restaurant does not list out accurate
prices, names or ingredients used in their food, less people will frequent their
restaurant, and their trust with their customers will fall.
Availability
Availability is how accessible your company’s information is to the people who
need it. People with the authorization to access private information need to access it
quickly, and private information must be kept available in case of emergencies such as
data breaches or natural disasters. Creating backups and recovery plans are a good
way to maintain availability within your company.
Functions of the CIA Triad
The CIA triad is similar to the cybersecurity framework in the context that it can
help improve or develop information security systems and guidelines in a company or
business. It helps provide the guidelines for a security system that meets all three
requirements of the CIA triad. It can also be used to detect flaws in your current information security plan, and protect against data breaches and hacks in your
company.
Authorization vs Authentication
Authorization and authentication are two very similar things, but in the context of
information security, they mean two very different things. Authentication is when
someone, usually an employee, must prove their identity and really are who they claim
to be. For example: logging into your computer with your username and password is an
example of authentication. Authorization is determining the level of access you have to
information within the company. For example, if you were the CEO of a company, you
would probably have blanket authorization to all networks and information of your
company, but if you were an office worker working in accounting, you would only have
the authorization of someone befitting that job, and given only the information needed to
do your job correctly.
How much gene editing is too much? – Ethan Vollbrecht
There are certain types of gene editing that is objectively helpful, such as the elimination of genetic disorders and diseases, but if it goes too far, for example making everyone a copycat superhuman by granting them the same perfect genetic code, that can lead to major problems.
Some editing of genes can be extremely helpful to the world at large. Disorders like single cell anemia, down syndrome and autism can be completely gone with correct editing of genes. However, there are some ethical problems to get to that stage and once we do get to that stage, there will be even more ethical factors to consider.
One factor is the amount of mistakes we can tolerate in our journey to perfecting gene editing. How many babies will get deformed or experimented on to perfect this science? How many mothers will give up their children in order for gene editing to be completed? The risks to get there far outstrip the rewards at this point in time. Another factor is if this technology is perfected, it will likely remain exclusive to the rich and powerful, making it so that the power difference between the wealthy and poor grow larger as even wealthy people will have perfected bodies that will live long lives.
“What Are the Ethical Concerns of Genome Editing?” Genome.gov, 3 Aug. 2017, https://www.genome.gov/about-genomics/policy-issues/Genome-Editing/ethical-concerns.