Social Implications of the 2023 U.S. National Cybersecurity Strategy Lexi Bowman CYSE 425W: Cyber Strategy and Policy Professor Aslan April 10, 2025 In 2023, the U.S. National Cybersecurity Strategy (NCS) brought about a paradigm shift in how the country deals with cybersecurity. It embraces a whole-of-society approach to enhance digital […]
Cybersecurity
Two-Factor Authentication: Weighing Security, Autonomy, and Accessibility Lexi Bowman CYSE 425W: Cyber Strategy and Policy Professor Aslan March 6, 2025 Two-factor authentication (2FA) operates as a security measure that demands two authentication steps to verify user identities. Two-factor authentication offers security benefits, yet it generates certain moral dilemmas. Users experience […]
Political Implications for Digital Forensic Standards Lexi Bowman CYSE 425W: Cyber Strategy and Policy Professor Aslan March 6, 2025 The Department of Justice (DOJ) has made guidelines for handling digital evidence in criminal investigations. These rules gather, preserve, and use data from devices, which are all keys to solving crimes. […]
Understanding Digital Forensic Evidence Standards Digital forensics evidence standards are very important guidelines that help ensure electronic evidence that is collected, preserved, and used in legal settings is reliable, accurate, and admissible in court. With the increasing use of technology in crime, digital forensics has become common in collecting evidence. […]
Analytical Paper Lexi Bowman Making cyber policies and building technology systems requires a deep understanding of how rapidly technology evolves and the broad effects these changes have on society. The article argues that while technological advancements promise great opportunities, they also bring unforeseen challenges, challenges that we cannot currently predict. […]
In Designing the Public Sphere: Information Technologies and the Politics of Mediation, Verbeek argues that technology is becoming so integrated into our lives that it’s no longer something separate we can just regulate from the outside. He suggests that businesses, governments, and individuals need to rethink how we approach technology. […]
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? Hans Jonas talks about how hard it is to predict the future effects of technology. Even when we think we know what will happen, there are always unexpected problems. This is especially true […]
Cyber technology has made it easier for employees to misuse work hours and resources in ways that reduce productivity and security. One common form of workplace deviance is “cyberloafing” which is spending time on personal browsing, social media, or shopping during work hours, which distracts from actual job tasks (Blanchard […]
SCADA Systems and Security ConcernsLexi BowmanSCADA systems are crucial for managing critical infrastructure but are at risk fromcyberattacks. Increased security measures are needed to protect them.Overview of SCADA SystemsSCADA (Supervisory Control and Data Acquisition) systems manage systems such as power,water, and gas facilities. These systems use parts like Human Machine […]
The Colonial Pipeline ransomware attack of May 2021 is a significant cybersecurity incident that focuses on the vulnerabilities ingrained in critical infrastructure systems. This attack disrupted fuel supplies across the eastern United States, highlighting the importance of sturdy cybersecurity measures for critical infrastructure. This paper examines the vulnerabilities exploited in […]