Cybersecurity Strategy: Human Factor, Software, and Redundancy Investments

With limited funding, a strategic approach to cybersecurity must prioritize high-impactinvestments that enhance resilience. If I were a Chief Information Security Officer (CISO), balancing investment in trainingversus new cybersecurity technologies is key to maximizing resources. Strategic allocation,based on data-driven best practices, optimizes each dollar spent. Recognizing the role of humanbehavior in cybersecurity is a critical…

Case Analysis on Information Warfare

In Alexis C. Madrigal’s article, “What Facebook Did to American Democracy,” the focusis on Facebook’s role in political campaigns, particularly the 2016 presidential election.The article examines how Facebook employs algorithms to deliver targeted ads toindividual users based on their interactions—such as likes, comments, and shares—on theplatform. Madrigal argues that the use of this social media…

Case Analysis on User Data

Data breaches are an inevitable and a threat to companies or organizations and it isespecially a serious threat to people’s privacy and their information. Thankfully, theEuropean Union has created a set of rules that will allow EU citizens to be more incontrol over their personal data. This set of rules is called the General Data…

Case Analysis On Whistleblowing

The term “whistleblower” evokes a range of reactions. Some view whistleblowers asheroes, essential for societal progress, while others see them as traitors who havebetrayed their country or violated their oath. I believe both perspectives hold validity inmany cases. In 2010, Chelsea Manning released a substantial amount of confidentialmilitary documents, including a video recorded from an…

Case Analysis on Professional Ethics

In the article “The Code I’m Still Ashamed of,” Bill Sourour shares his story of landing a full-time coding job at an interactive marketing firm. While working there, he was assigned a project involving a drug marketed to teenage girls. The drug was promoted via a website that, through its graphics and overall style, was…

Case Analysis on Cyberconflict

Cyberconflict, encompassing cyber terrorism and cyber warfare, is a domain where technology, vulnerabilities, and security flaws in digital systems are exploited as tactical weapons. These conflicts often occur between nations and can have both virtual and physical dimensions. This case analysis explores the ongoing cyber and physical conflict between Israel and Iran. This intricate and…

CIA Triad

The CIA Triad—Confidentiality, Integrity, and Availability—provides a framework for protecting information in the digital world. Together with the processes of Authentication (confirming identity) and Authorization (controlling access), these concepts ensure the security and reliability of data and systems.  Imagine you’re protecting a treasure chest filled with valuable items. You want to make sure only the…