Some of the things that I have noticed while reading the articles are that in the malicious code written into DNA infects the computer that reads it is that. It starts off by stating that some biologists were able to infect the DNA of the computers program. A team from the University of Washington exposed…
Scada Jeremiah
Jeremiah RobinsonCYSE200T10/26/24Write Up SCADA SystemsThe Systems of SCADAWhat SCADA means is Supervisory Control and Data Acquisition. Which is used to manageinfrastructures and is a Industrial Control System or otherwise known as ICS. The SCADAsystems usually deal with human interfaces and the way the data proceeds.Another importantpart of the system is how the data gets collected…
Jeremiah Robinson CISO
For business continuity, customer trust, and regulatory compliance, as the Chief Information Security Officer (CISO) of a publicly traded company, maintaining system availability is essential. In order to do this, I would put the following safeguards in place: Redundant Infrastructure: Cloud environments and geographically dispersed data centers guarantee that operations continue even in the event…
Jeremiah Robinson Cyber Risk
CYSE 200T October 7, 2024 Cyber Risk Assignment What was Cutting Edge Cutting Edge (2017) was a cyberattack that targeted the U.S. defense industrial base, which is used globally in fields like telecommunications, finance, aerospace, and technology. The attack was executed through exploits in VPN appliances belonging to Ivanti Connect Secure. The exploits used are…