Journal 14
April 26, 2020
Markets, businesses, groups, and individuals should all be limited differently in the face of diminishing state power and the intelligification and networking of the material world. Technology involves everything from smart phones and other smart devices. It is all connected to the Internet which changed our lives today. Technology markets are one of the most rapidly increasing markets in the world. It is likely to end up shaping our future in the upcoming years. The acceleration in innovation of technology has created challenges for those markets to be regulated. Tech Firms and businesses need more regulations because of the diversified nature of technology. In addition, because of the competing business models of different firms. This is especially pronounced when it comes to priorities such as having stronger cybersecurity and combating inaccurate information. It will require cultural change. In order to regulate businesses, governments first need to figure out the appropriate regulatory scope for the industry. A process government can put technology businesses on a level playing field is to incorporate a regulator for the technology industry. Adding a regulatory regime with global statutes and clearly defined rules of engagement would lower the cost of innovation while keeping businesses accountable for mitigating abuses of their inventions. Businesses will start by defining what is within the regulated perimeter in order to follow protocol. There are many groups in the world whose missions range from technological themes to specific specialties, such as coding, open source or local-area networking management. Also, there are many nonprofit groups, such as the Association for Federal Information Resources, Industry Advisory Council and Women in Technology. Most technology companies provide user communities and forums for their products. Those groups should be limited in order to effectively control potential threats from new technologies. Developing associations with individuals is tied in with the structure of the validity of an individual’s image. It should be regulated to have rules and guidelines on the thing’s individuals can do.
Journal 6
February 23, 2020
According to the annual SANS Institute industrial control systems survey, industrial control systems cybersecurity threats are growing and identifying attacks continues to be a huge challenge. Internal threats, external threats, ransomware and device that is insecurely connected to the network are major threats in industrial cyber systems. Internal threats are threats that come from employees, ex-employees, contractors or even third parties. Because most industrial cyber systems don’t have encryption mechanisms that don’t allow any user activity, a insider can get access to any device in the network. SCADA applications are available to insiders as well. SCADA applications are responsible for the entire life cycle of industrial processes. Other examples of internal threats are opening malicious mails and loss of laptop or other devices. External threats are from politically motivated adversaries, criminal organizations, and hackers. Cyber criminals are sending ransomware attacks targeting industrial control systems. Ransomware attacks has increased over the years. However, industrial control systems can prevent ransomware hits by continuity planning, having strong security standards, monitoring and detection. Devices that are insecurely connected to the network is considered to be the number one worst threats for industrial control systems. Devices such as USB, CD/DVDs, and hard drives need to be scanned for viruses and worms. We can mitigate the risks in engineering cyber systems by test web-facing servers often. Hackers discover new ways to exploit peoples servers, so it is best if people scan their web servers inside and outside their network. Finding out who is on your server can mitigate a risk in engineering systems. Individuals can look for anything suspicious or anything out of the ordinary on their server. An important risk to look out for is malicious software. Monitor anti-malware and anti-virus software. Making sure update feature is on. Also, checking software to ensure the program is running smoothly.
Journal 8
March 8, 2020
All businesses are benefiting from cyber programs because it secures, cloud computing, email, social networking, Wi-Fi and other systems. It is to prevent hackers to gain access to proprietary and confidential client information. Cost may be determined by risk management processes, size of company, type of company, employee access to data, and types of virus protection software. Cyber liability coverage could cover costs that arise from breaches, cost for restoring business, and costs from business interruptions. According from one company, it estimates that the “security awareness training market will grow from $1 billion in 2014 to $10 billion by 2027” (Morgan, 2017). Cybersecurity programs such as Digital Defense, Inspired eLearing, KnowBe4, and Phishme all help to secure businesses. The global loss to cyberattacks was $7.7 million a year. The U.S had the highest average loss of $15 million per business and Russia had the lowest average cost at $2.37 million. In 2013, cost businesses on average $8,699 per attack. It has been recently recored that that number increased to $20,752 per attack. Law firm businesses have cybersecurity programs starting at $175 a month, based on the size of the law firm. They are greatly benefiting from cybersecurity programs. Cyber Revolution, Inc is bringing the solution long waited by law firms by using the Serenity Plan. The plan includes a cyber security brief, risk assessment audit, two hours of trading and risk assessment per month with a 24/7 emergency support. Companies can use different vendors for different types of components to their security. Furthermore, companies that use traditional cybersecurity approaches can reduce costs by using solutions that have centralized consoles and enhanced systems. It will be reducing the amount of time spent on day to day tasks. The hardware costs is at least $3,000, cybersecurity software is around $4,800, and admin resources for IT security is $4,000 a month.