Write-Up: The Human Factor

As the Chief Information Security Officer (CISO), realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology?  That is, how would you allocate your limited funds?  Explain your reasoning.

Write-Up: Attacks on Availability

What is an “attack on availability”? Describe a recent example of such an attack. Discuss the broader implications of these attacks on organizations and users.

Cybercrime Theories

Identify which theories you think best explain cybercrime and discuss what you like about that theory.

Write-Up: SCADA Systems

In this write-up you will using your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.

Digitizing DNA

Identify possible ethical considerations of CRISPR gene editing and explain position

Data Breaches and Privacy

Visit PrivacyRights.org to see the types of publicly available information about data breaches.  How might researchers use this information to study breaches?  What branch or branches of Social Science do you think would benefit the most from a site hosting this information?

Protecting Availability

In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?