Discussion Prompt: Based on your readings related to the BioCybersecurity section of this course, identify possible ethical considerations and explain your position. Response: An emerging topic known as “cyberbiosecurity” deals with the interaction between biosciences clinical and research practice and cybersecurity. Ethical issues that occur include the accessibility and use of confidential information, the possibility…
Category: IT/CYSE 200T
Write-Up: SCADA Systems
SCADA stands for supervisory control and data acquisition. This system also refers to Industrial Control Systems also known as ICS which is used to control infrastructure, facilities, and industrial processes. In a journal it stated, “An example of this are the SCADA systems that control the Energy Generating and distributing infrastructure, the water systems and…
Write-up: The Human Factor in Cybersecurity
There are so many ways cybersecurity can be implemented into a company’s training protocols. If I was a Chief Information Security Officer I would start by adding a system like the NIST Framework. I would do this because the NIST Framework is an essential part of companies’ cybersecurity protocol. A framework like this helps them…
Discussion Board: Protecting Availability
Discussion Prompt: What protections would you implement to ensure availability of your systems (and why)? Response: I think that the two main protections I would put in place would be tools put in place for preventing data loss, and redundancy in data. I would use tools for preventing data loss because it can shield data…