As the Chief Information Security Officer (CISO), realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology? That is, how would you allocate your limited funds? Explain your reasoning.
Category: CYSE 200T Cybersecurity, Technology, & Society
Write-Up: Attacks on Availability
What is an “attack on availability”? Describe a recent example of such an attack. Discuss the broader implications of these attacks on organizations and users.
The “Short Arm” of Predictive Knowledge
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?
Write-Up: SCADA Systems
In this write-up you will using your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.
Digitizing DNA
Identify possible ethical considerations of CRISPR gene editing and explain position
Protecting Availability
In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?