CLASSWORK

– DICUSSION BOARD POST –

Based on your readings related to the Bio Cybersecurity section of this course, identify possible ethical considerations and explain your position.

After reading these two articles, I got an understanding of Bio Cybersecurity. They talked about how if someone gained access to your social security that it could be replaced but also you would have an hassle from this being stolen. DNA is totally different, this is your genetic makeup and this makes who you are as a person. Stealing this type of personal information could possible be the biggest impact and could have the highest pay in the dark web for personal information. I would consider on how DNA data is stored and go from there. Hackers will always try to find ways to exploit new vulnerabilities. But I would make sure that the data isn’t stored with weak security and weak vulnerable points in the system. We should consider a more advance cyber security system since (PII) is a known cyber risk. Make sure all systems have high availability and are highly monitored. You could also use a honeynet with honeypots to see if someone is trying to attack your system and learn from the attackers.

________________________________________________________________________________________________________________

In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?

Learning more about the CIA triad I got a better understanding about confidentiality, integrity, and availability. To my understanding availability refers to ensuring reliable and timely matter to access information. I would maintain a proper functioning operating system and keep current machines with all system updates and upgrades. Software such as firewalls would be implemented and I would also try to limit human error. Educational training would be mandatory and frequent to make sure the availability is the best as it can be.  I would also make sure that power outages wouldn’t create data loss for the company. I would make sure we have up-to-date generators and to make sure natural disasters can’t cause data loss either. I would make sure to have back up copies that is stored in a different geolocation that is also fire and waterproof.

Reference 

https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA#:~:text=Rigorously%20maintaining%20hardware%2C%20performing%20hardware,current%20with%20all%20system%20upgradesLinks to an external site.

________________________________________________________________________________________________________________

How has cyber technology created opportunities for workplace deviance?

Cyber technology has created a lot of job opportunities and more to come in the future. Cyber technology has improved over the years and is growing to be a long term career choice. But with cyber technology you have to understand that certain individuals have different motives. Work deviance is described voluntary behavior that violates the rules, norms, or expectations of an organization. It’s not uncommon for somebody wanting to get revenge from their job or exploit the weakness of a company to gain beneficial information. This is a case that you may have to look out for, some individuals want to tear down a company’s reputation or even gain financial benefits from becoming a insider threat. Insider threat is a term used in cybersecurity when somebody inside the organization is trying to cause harm to the company.