In Verbeek’s writing, he talks about how the world is becoming more connected and “intelligent” through technology. This means everyday things—like phones, cameras, even cars—can now collect data, make decisions, and connect to the internet. At the same time, the government doesn’t have as much control as it used to, because businesses and technology are…
The “Short Arm” of Predictive Knowledge
From this week’s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge? Jonas says we can’t always predict how new technology will affect the future. Because of this “short arm” of knowledge, we should be careful when creating cyber-policy and building tech systems. It’s important…
How has cyber technology created opportunities for workplace deviance?
Cyber technology has made it easier for workplace deviance to happen. Employees can now misuse company devices or internet access, like browsing social media, shopping, or watching videos during work hours. Some may steal data, send harmful emails, or hack systems. Remote work can also reduce supervision, making it easier to break rules without getting…
Exploring Attacks on Availability
An “attack on availability” is a type of cyberattack designed to make systems, networks, or data inaccessible to users. These attacks disrupt normal operations by overwhelming or restricting access to critical resources. Cybercriminals use various techniques, such as Distributed Denial of Service (DDoS) attacks and ransomware, to prevent legitimate users from accessing services. These attacks can…
The Human Factor in Cybersecurity
If I had a limited budget, I would split the money like this: This plan balances employee awareness and strong security tools to protect SCADA systems while staying within budget.
SCADA Systems
SCADA Vulnerabilities and Risk Mitigation BLUF: Supervisory Control and Data Acquisition (SCADA) systems help run important infrastructure like power grids, water plants, and factories. However, they were not originally built with strong security, making them easy targets for cyberattacks. To keep them safe, organizations need to understand their risks and apply strong security measures. Introduction SCADA…
Hacking Humans
https://drive.google.com/file/d/17vZTrd3tyRkIuXtLfYKSeZypU7WpCkmM/view The article talks about the growing popularity of direct-to-customer DNA testing services, where people can learn about their ancestry and genetic traits. While this has become a common practice, the digital storage of DNA data presents significant risks. If hackers manage to steal this sensitive information, they could misuse it for various harmful purposes,…
Ethical Considerations of CRISPR Gene Editing
The growing field of bio-cybersecurity brings up important ethical issues, especially with the use of DNA data. One major concern is the privacy and safety of people’s DNA. DNA is a very personal and unique form of information that can’t be changed, so if it gets stolen, it can lead to serious consequences. Unlike a…
CIA Triad Overview
The CIA Triad stands for Confidentiality, Integrity, and Availability. These three principleshelp protect data in a secure system:1. ConfidentialityConfidentiality means keeping information private and only accessible to peoplewho have permission. For example, an online store keeps customer credit carddetails secret, and only the person who owns the card should be able to see theinformation.2. IntegrityIntegrity…
Protecting Availabilty
As the CISO of a publicly traded company, it’s important to make sure our systems are always up and running. First, I would set up regular backups to automatically save important data both on-site and off-site, so we can quickly recover if something goes wrong. I would also create a plan to quickly restore systems…