As the Chief Information Security Officer (CISO), realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology? That is, how would you allocate your limited funds? Explain your reasoning.
Author: hcara002
Write-Up: Attacks on Availability
What is an “attack on availability”? Describe a recent example of such an attack. Discuss the broader implications of these attacks on organizations and users.
Cybercrime Theories
Identify which theories you think best explain cybercrime and discuss what you like about that theory.
The “Short Arm” of Predictive Knowledge
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?
Write-Up: SCADA Systems
In this write-up you will using your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.
Digitizing DNA
Identify possible ethical considerations of CRISPR gene editing and explain position
Data Breaches and Privacy
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? What branch or branches of Social Science do you think would benefit the most from a site hosting this information?
Protecting Availability
In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?