Introduce Yourself to the Class

  • Caleb
  • Cyber Security 
  • I’m from Alexandria Virginia 
  • I’m taking this course to get a better understanding of cybersecurity 

__________________________________________________________________________________

CYSE200T

Discussion Board: The NIST Cybersecurity Framework

The National Institute of Standards and Technology (NIST) established the NIST Cybersecurity Framework, to provide organizations with an extensive set of recommendations for handling and improving their cybersecurity posture. Improved cybersecurity resilience constitutes one of the primary benefits this design offers to enterprises. Companies can more effectively understand, identify, safeguard against, handle, and recover from online security hazards and incidents by putting the NIST Framework into action.

______________________________________________________________________

Discussion Board: Protecting Availability

If I were a CISO which is a (Chief Information Security Officer) for a public training company I have to make sure my network is properly protected. Two ways I would protect my internet is by having a disaster recovery plan and also by having my employees well trained.  having a disaster recovery plan will make rebuilding your network a lot easier and it’s always good to have a backup plan. In addition, if you have your employees well-trained to know how to recognize and report security Incidents. Will ultimately help you decrease the amount of cybercrime on my network. 

____________________________________________________________________

Discussion Board: Ethical Considerations of CRISPR Gene Editing

The related bio-cybersecurity section I chose to cover was information technology & cybersecurity. One of the possible ethical considerations is when NIST: An Introduction to Information Security talks about security elements.  For example, the first element Information security supports the organization’s mission and tells the reader that for your organization to be successful you need to carefully implement information security controls.  Based on this information  I believe that well-chosen security rules and procedures that are put in place to protect important assets support the overall organizational mission. 

___________________________________________________________________

Discussion Board: Opportunities for Workplace Deviance

Cyber technology’s natural complexity and confidentiality have made it an ideal setting for workplace misconduct. It stimulates deviance in part by allowing unauthorized access to private data. Technically skilled employees can violate security procedures to steal information or compromise systems, enabling the company to experience economic damage or reputational harm.  Although cyber technology has brought along numerous positive developments in the workplace, it has also created opportunities for abnormal conduct, which companies need to actively combat with strong cybersecurity, well-defined regulations, and continuous training. 

______________________________________________________________________

The “Short Arm” of Predictive Knowledge

The “short arm” of predictive knowledge implies that creating cyber-policy and infrastructure must be done flexibly and dynamically. To anticipate and combat new dangers, focus on concepts like resilience, versatility, and teamwork. Provide adaptable frameworks that can evolve as risks and advancements in technology occur.  Also, take priority to learning and instruction to develop a workforce with the necessary abilities for navigating the constantly changing internet world. To improve environmental awareness and response capabilities, encourage collaboration on information between the general public and business organizations. Support innovation while making certain that security and confidentiality are important aspects of the development process. Finally, update and review equipment and policies often to take into account emerging technology and issues.