{"id":281,"date":"2022-12-05T03:40:12","date_gmt":"2022-12-05T03:40:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/?page_id=281"},"modified":"2022-12-05T04:37:04","modified_gmt":"2022-12-05T04:37:04","slug":"discussions-and-write-ups","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/discussions-and-write-ups\/","title":{"rendered":"Discussions and Write-ups"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Ethan Vollbrecht &#8211; Workplace Deviance Discussion board<\/p>\n\n\n\n<p>Workplace deviance can range from many things, but in the context of cybersecurity, workplace deviance could be giving away passwords, playing pranks on coworkers, and tampering with company property.<\/p>\n\n\n\n<p>The definition of workplace deviance is any behavior in the workplace that is considered insubordinate or sabatoging to the company. This can include not following instructions, aggressive behavior towards other employees or just simple laziness. In the case of cyber technology, laziness can extend to not responding to threats fast enough and leaking passwords on the internet. Simple things that could be done in any work place.<\/p>\n\n\n\n<p>There are far more ways cyber technology has created opportunities for deviance with the introduction of working from home. Working from home introduces several opportunities for workplace deviance. You can ignore your boss easier, since he isn&#8217;t talking right to you, pretend your wi-fi is disconnecting and many more things.<\/p>\n\n\n\n<p>Scott, Sherrie. \u201cDisrespectful Behavior in the Workplace.\u201d&nbsp;<em>Small Business &#8211; Chron.com<\/em>, Chron.com, 21 Nov. 2017, https:\/\/smallbusiness.chron.com\/disrespectful-behavior-workplace-10754.html.<\/p>\n\n\n\n<p>What is the CIA Triad?<br>The CIA Triad is a framework for companies to guide and protect security and<br>intelligence within the company. The letters in CIA stand for Confidentiality, Integrity, and<br>Availability.<\/p>\n\n\n\n<p><br><strong>Confidentiality<\/strong><br>Confidentiality is how secure data and information is kept inside a company.<br>Confidentiality is giving authorization only to people who need the information to<br>perform their jobs. For example, people who work in accounting will only be given<br>information needed to do their job, such as bank notes, tax invoices etc.<\/p>\n\n\n\n<p><br><strong>Integrity<\/strong><br>Integrity is proof that the data your company owns is trustworthy, reliable and<br>accurate. It is how the company makes sure they are authentic and trustworthy. If<br>information your company gives out does not have integrity, people will stop coming to<br>use your company\u2019s services. For example, if a restaurant does not list out accurate<br>prices, names or ingredients used in their food, less people will frequent their<br>restaurant, and their trust with their customers will fall.<\/p>\n\n\n\n<p><br><strong>Availability<\/strong><br>Availability is how accessible your company\u2019s information is to the people who<br>need it. People with the authorization to access private information need to access it<br>quickly, and private information must be kept available in case of emergencies such as<br>data breaches or natural disasters. Creating backups and recovery plans are a good<br>way to maintain availability within your company.<\/p>\n\n\n\n<p><br><strong>Functions of the CIA Triad<br><\/strong>The CIA triad is similar to the cybersecurity framework in the context that it can<br>help improve or develop information security systems and guidelines in a company or<br>business. It helps provide the guidelines for a security system that meets all three<br>requirements of the CIA triad. It can also be used to detect flaws in your current information security plan, and protect against data breaches and hacks in your<br>company.<\/p>\n\n\n\n<p><br><strong>Authorization vs Authentication<\/strong><br>Authorization and authentication are two very similar things, but in the context of<br>information security, they mean two very different things. Authentication is when<br>someone, usually an employee, must prove their identity and really are who they claim<br>to be. For example: logging into your computer with your username and password is an<br>example of authentication. Authorization is determining the level of access you have to<br>information within the company. For example, if you were the CEO of a company, you<br>would probably have blanket authorization to all networks and information of your<br>company, but if you were an office worker working in accounting, you would only have<br>the authorization of someone befitting that job, and given only the information needed to<br>do your job correctly.<\/p>\n\n\n\n<p>How much gene editing is too much? &#8211; Ethan Vollbrecht<\/p>\n\n\n\n<p>There are certain types of gene editing that is objectively helpful, such as the elimination of genetic disorders and diseases, but if it goes too far, for example making everyone a copycat superhuman by granting them the same perfect genetic code, that can lead to major problems.<\/p>\n\n\n\n<p>Some editing of genes can be extremely helpful to the world at large. Disorders like single cell anemia, down syndrome and autism can be completely gone with correct editing of genes. However, there are some ethical problems to get to that stage and once we do get to that stage, there will be even more ethical factors to consider.<\/p>\n\n\n\n<p>One factor is the amount of mistakes we can tolerate in our journey to perfecting gene editing. How many babies will get deformed or experimented on to perfect this science? How many mothers will give up their children in order for gene editing to be completed? The risks to get there far outstrip the rewards at this point in time. Another factor is if this technology is perfected, it will likely remain exclusive to the rich and powerful, making it so that the power difference between the wealthy and poor grow larger as even wealthy people will have perfected bodies that will live long lives.<\/p>\n\n\n\n<p>\u201cWhat Are the Ethical Concerns of Genome Editing?\u201d&nbsp;<em>Genome.gov<\/em>, 3 Aug. 2017, https:\/\/www.genome.gov\/about-genomics\/policy-issues\/Genome-Editing\/ethical-concerns.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethan Vollbrecht &#8211; Workplace Deviance Discussion board Workplace deviance can range from many things, but in the context of cybersecurity, workplace deviance could be giving away passwords, playing pranks on coworkers, and tampering with company property. The definition of workplace deviance is any behavior in the workplace that is considered insubordinate or sabatoging to the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/discussions-and-write-ups\/\">Read More<\/a><\/div>\n","protected":false},"author":24958,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/wp-json\/wp\/v2\/pages\/281"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/wp-json\/wp\/v2\/users\/24958"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/wp-json\/wp\/v2\/comments?post=281"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/wp-json\/wp\/v2\/pages\/281\/revisions"}],"predecessor-version":[{"id":287,"href":"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/wp-json\/wp\/v2\/pages\/281\/revisions\/287"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ethan-vollbrecht\/wp-json\/wp\/v2\/media?parent=281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}