{"id":316,"date":"2025-04-28T02:42:50","date_gmt":"2025-04-28T02:42:50","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/k3bron\/?page_id=316"},"modified":"2025-04-28T02:56:58","modified_gmt":"2025-04-28T02:56:58","slug":"write-ups-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/k3bron\/write-ups-2\/","title":{"rendered":"Write-Ups"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"720\" height=\"340\" src=\"http:\/\/sites.wp.odu.edu\/k3bron\/wp-content\/uploads\/sites\/37294\/2017\/11\/mautic_developer_mautician-720x340.jpg\" alt=\"\" class=\"wp-image-119\" style=\"width:752px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/k3bron\/wp-content\/uploads\/sites\/37294\/2017\/11\/mautic_developer_mautician-720x340.jpg 720w, https:\/\/sites.wp.odu.edu\/k3bron\/wp-content\/uploads\/sites\/37294\/2017\/11\/mautic_developer_mautician-720x340-300x142.jpg 300w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/figure>\n\n\n\n<p><strong><mark class=\"has-inline-color has-vivid-red-color\">CIA Triad<br><\/mark><\/strong>CIA Triad is a basic cyber security framework that makes sure that information systems<br>stay safe by enforcing three postulates:<br>1. Confidentiality \u2013 Prevent unauthorized hands from accessing sensitive information.<br>Precautions include:- control of access,encryption, and multi-factor authentications<br>(MFA).<br>2. Integrity \u2013 Makes sure that information is reliable and is what it is supposed to be.<br>Precautions include:- digital signs, and hashing function.<br>3. Availability \u2013 Makes sure that legitimate people can view information and programs<br>whenever there is need. Precautions include redundancy, failover servers, and recovery<br>plans.<br>Authorization vs. Authentication:<br>&#8211; Authorization says what is permitted to what guy after making sure that guy is legitimate<br>(e.g., what files or servers are accessed by what kind of role of guy).<br>&#8211; Authentication makes sure that you actually are what you pretend to be. It makes sure<br>that guy actually is what guy claims to be (e.g., using password, fingerprint, or MFA).<br>Example:<br>To view your bank website, you need to authenticate (enter username and password). After<br>authenticating, what can or can&#8217;t you do is controlled by authorization, i.e., view account<br>balances but can&#8217;t approve big transactions unless your role is admin.<\/p>\n\n\n\n<p><strong><mark class=\"has-inline-color has-vivid-red-color\">Ethical Considerations of CRISPR Gene Editing<\/mark><\/strong><\/p>\n\n\n\n<p>BioCybersecurity, which is the marriage of biology with cybersecurity, offers several ethical concerns worth discussing. Primarily among the ethical concerns is the matter of privacy. Since biological data, such as DNA and medical data, is incorporated in computer systems, the data are at risk of disclosure, misuse, or theft of personal data. This can result in discrimination, identity theft, or unwarranted monitoring. Moreover, increased use of biometric data for verification purposes or other uses can result in the loss of control by individuals over the ways in which their private data are stored, shared, or accessed, eroding autonomy.<\/p>\n\n\n\n<p>Another basic ethical issue is the consent. With the increased application of bio-interfaces in cybersecurity, individuals may be unconsciously relinquishing consent for their biological data to be utilized in particular ways. Individuals may be required to give up their biological data for the purpose of authentication with no knowledge of the dangers. And whose biological data is it? Do we treat it as personal data or something more vulnerable to abuse?<\/p>\n\n\n\n<p>There is also the possibility of weaponizing bio-cyber technologies, such as using biological data for creating bio-hacking tools or controlling biological systems in order to cause damage. This puts a spotlight on misuse, accountability, and the requirement for control in the area of bio-cybersecurity.<\/p>\n\n\n\n<p>In short, while there exists tremendous bio-cybersecurity possibility in propelling technology ahead, it is equally fraught with real ethical concerns in the areas of privacy, consent, ownership of biological data, and possibility of malicious abuse. Solution of such matters necessitates thoughtful and reflective consideration to protect the rights and freedoms of the people in the context of emerging technology.<\/p>\n\n\n\n<p><strong><mark class=\"has-inline-color has-vivid-red-color\">Protecting Availability<\/mark><\/strong><\/p>\n\n\n\n<p>Since I am a CISO for a listed company, our system availability is&nbsp;most&nbsp;critical.&nbsp;In order to&nbsp;guarantee this, I would implement a multi-layer system that includes redundancy, disaster recovery planning, and threat monitoring ahead of time.<\/p>\n\n\n\n<p>To begin with, I would have redundant&nbsp;systems&nbsp;and failover systems&nbsp;in order&nbsp;to minimize downtime.&nbsp;This would include load balancing across several data centers, using cloud-based infrastructure with auto-scaling capabilities, and&nbsp;having&nbsp;geographically distributed backup systems.&nbsp;With this, even if one system fails, operations can be easily&nbsp;shifted to another.<\/p>\n\n\n\n<p>Second, I would establish a detailed disaster recovery (DR) and business continuity plan (BCP).&nbsp;Regular&nbsp;onsite&nbsp;and&nbsp;offsite&nbsp;backups would be required to recover vital data in the event of an outage or&nbsp;cyber attack.&nbsp;Additionally, routine DR drills ensure that&nbsp;the&nbsp;employees are aware of how to respond to interruptions.<\/p>\n\n\n\n<p>Third, active monitoring and threat containment are critical.&nbsp;Having Security Information and Event Management (SIEM) systems and Artificial Intelligence-based anomaly detection would allow real-time monitoring of network traffic and potential threats.&nbsp;A separate Security Operations Center (SOC) would watch this to be able to respond in a timely manner to incidents.<\/p>\n\n\n\n<p>Finally, employee training and awareness programs would be put in place to avoid human error, a primary source of security breaches.&nbsp;Phishing simulations and security best practice workshops held on a regular basis would reduce threats from social engineering attacks.<\/p>\n\n\n\n<p>With these controls, I would ensure our systems are&nbsp;very&nbsp;available, protected against cyber attacks, and can conduct business processes with minimal downtime.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n\n\n\n\n\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><\/figure>\n\n\n","protected":false},"excerpt":{"rendered":"<p>CIA TriadCIA Triad is a basic cyber security framework that makes sure that information systemsstay safe by enforcing three postulates:1. Confidentiality \u2013 Prevent unauthorized hands from accessing sensitive information.Precautions include:- control of access,encryption, and multi-factor authentications(MFA).2. Integrity \u2013 Makes sure that information is reliable and is what it is supposed to be.Precautions include:- digital signs,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/k3bron\/write-ups-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29815,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/k3bron\/wp-json\/wp\/v2\/pages\/316"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/k3bron\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/k3bron\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/k3bron\/wp-json\/wp\/v2\/users\/29815"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/k3bron\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/k3bron\/wp-json\/wp\/v2\/pages\/316\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/sites.wp.odu.edu\/k3bron\/wp-json\/wp\/v2\/pages\/316\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/k3bron\/wp-json\/wp\/v2\/media?parent=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}