How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?

We must build a flexible and adaptive approach to cyber-policy and infrastructure in order to meet this issue. This involves making significant investments in cybersecurity safeguards that can lessen the effects of cyberattacks even when they cannot be foreseen in advance, including encryption and multi-factor authentication. To help people and companies better grasp the risks…

Opportunities for Workplace Deviance

Particularly in the context of information technology and communication, cyber technology has produced a lot of chances for workplace misbehavior. This can happen in a variety of ways, including:

Ethical Considerations of CRISPR Gene Editing

To my knowledge CRISPR is used as a sort of “gene therapy.” It has been around for a while now because we had a similar discussion about it in my AP biology class when I was a senior in high school several years ago. Our discussion back then went the route of using CRISPR to…

Protecting Availability

I feel as if everything in the CIA triad is very closely related, so in that case, stuff implemented for confidentiality and integrity would also play a key role in availability of the system as a whole. That being said, here are some of the things I would implement to help achieve availability.  1. I…