The approach of a cyber-policy with the “short arm” of predictive knowledge should be one that considers not the future and possibilities of attacks, but rather focuses on the known vulnerabilities and looks to strengthen the already existing frameworks. It would be too detrimental to try and leave a less secure system in place while…
Author: pdoug001
Opportunities for Workplace Deviance
Cyber technology advances in the workplace have revolutionized efficiency and security in the workplace. Several key security features in the workplace require company employees to maintain a security clearance and maintain diligent practices as these security features rely on the employee. It is common place now to require a security clearance to work in most…
Ethical Considerations of CRISPR gene editing
There are many ethical considerations to be had with Bio Cybersecurity and specifically CRISPR gene editing. Society is on the brink of a technological nightmare scenario, where our own DNA could become assets or even weapons when in the hands of the wrong people. CRISPR gene editing has allowed for the modification of DNA strands…
Going on a job hunt!
One thing I noticed with all of these job listing is that almost, if not all of them, are government jobs mainly. Although the private sector does offer a few from some initial research I did, the majority of the first few results that were turned up were government job listings. All of these jobs…
CISO Accessibility Actions
In a hypothetical scenario where I am placed as the Chief Information Security Officer, I would take the basic, fundamental steps in ensuring a systems availability. The first and most pressing matter regarding uptime, is the servers on which these systems operate. Making sure that all hardware and software aspects remain up to date is…
What is the defining difference between computer security and information security?
Computer security and information security are two branches of the same tree so to speak. Computer security can be considered a physical or logical approach to protecting assets that can be attained through computers. Measures taken in the computer security aspect can be anywhere from password protected systems to firewalls blocking incoming traffic to a…
What are the biggest IoT security risks and challenges?
Some of the biggest security risks that pose a threat to the internet-of-things would have to be the malicious actors trying to attack the systems we have in place. Since 2012, the world connected through IoT has seen an exponential increase in attacks and threats. In 2013 alone, in a study conducted by the University…
What is the difference between a threat and an attack?
The terms “threat” and “vulnerability” directly associate with one another. A threat is the prospect of damage being done and in the context this includes a possible hack, or cyber attack. Vulnerabilities are the means by which these threats become attacks and deal damage. It only comes from experience and applying these methods can we…
Pros and Cons of involving law enforcement in a Cybersecurity incident.
The decision to escalate incidents to law enforcement with conflict prevalent bears many pros and cons. In one hand, the resources and manpower that law enforcement holds is quite substantial when compared to that of a non government entity. The escalation also brings the introduction of potential long lasting effects such as lawsuits or fines…
Cyberterrorism V.S. Terrorism
A concise infographic categorizing the similarities and differences between terrorism and cyberterrorism.