{"id":294,"date":"2024-04-23T00:28:28","date_gmt":"2024-04-23T00:28:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/renardheath\/?p=294"},"modified":"2024-04-23T00:28:28","modified_gmt":"2024-04-23T00:28:28","slug":"digital-values-impacts-on-business","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/renardheath\/2024\/04\/23\/digital-values-impacts-on-business\/","title":{"rendered":"Digital Values Impacts on Business"},"content":{"rendered":"\n<p>BLUF<\/p>\n\n\n\n<p><a><\/a><em>Every Industry that uses technology to exchange data must protect, ensure its accuracy, and have efficient access to its information. The CIA Triad is a fundamental concept in cybersecurity that provides a starting point for that framework. Thus, understanding the utility of these three principles is the foundation for creating a robust security foundation for systems and data.<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;Cybersecurity encompasses two aspects of consideration: the system and the user. The user also plays three roles: the gatekeeper, the threat, and the victim. These roles present quite a complex challenge in establishing an organization&#8217;s Cybersecurity posture that protects data through established protocols and policies. Both aspects are true, but when combined, they can have a societal impact similar to the Model T Ford had on transportation.<\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Definition of Cybersecurity-related Technical Systems<\/h1>\n\n\n\n<p>A cybersecurity-related system is a system that is based on software that relies on other software and hardware to work properly. It could be a simple system that requires a login to access some information or a large, complex system like an electricity grid or critical infrastructure for a city. Unprotected communication protocols and channels like in the SCADA network are considered one of the weakest parts from a security perspective, according to IEC60870-5-101&nbsp;(Qassim, 2019). As technology advances and more things become based around computers, the scope of a technical system will continue to grow. Many systems, like the SCADA systems, rely on legacy communication protocols that lack encryption or authentication mechanisms, making them susceptible to eavesdropping, tampering, and spoofing attacks. These systems are what cybersecurity is trying to protect. The word \u201ccyber\u201d can be misleading; the system does not have to be connected to the internet to fall under cybersecurity, nor does it have to be focused on information technology. SCADA Systems are tools for controlling and monitoring critical enterprise infrastructures for services and utilities that are important to a community&#8217;s quality of life. Any system that processes information is a potential target for attack and must be considered for cybersecurity. The evolution of regular telephone lines to digital infrastructure with voice-over-internet protocols (VOIP) presents some additional vulnerabilities that legacy SCADA systems should be updated to address.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><a><\/a>Importance of Cybersecurity in the Digital Age<\/h1>\n\n\n\n<p><a><\/a>CIA stands for Confidentiality, Integrity, and Availability; these principles can establish security policies for Data retention, control, and access. The most important asset to every industry is knowledge (i.e., Data). The CIA Triad is crucial for enterprises because it helps establish a comprehensive approach to information security. Confidentiality safeguards sensitive data, maintaining trust and compliance. Integrity ensures the accuracy and reliability of information, preventing unauthorized modifications. Availability ensures that resources are accessible when needed, supporting business continuity. A well-balanced implementation of the CIA Triad helps mitigate the overall security posture of an enterprise in the ever-changing world of cybersecurity threats. A quote from TechTarget:<\/p>\n\n\n\n<p><em>\u201cAll businesses have data that&#8217;s valuable and that has to be protected,&#8221; said Candy Alexander, international president of the Information Systems Security Association, a nonprofit organization for information security professionals and practitioners.&nbsp;(Pratt, 2022)\u201d<\/em><\/p>\n\n\n\n<p>Whether it is a home network with residential computers or an enterprise network with high-level data centers, I believe people and organizations see data as important assets and would like to keep it protected. Cybersecurity\u2019s most general aspect in these times is to keep information out of the hands of people who are not authorized to use it. In more specific cases, it can help keep an organization&#8217;s financial data and corporate strategy from leaking out. High-profile examples are the Stuxnet attack and the LinkedIn breach that bled over to Dropbox, a company that had one thing in common: an engineer who didn\u2019t practice the CIA triad for data protection. On an individual level, privacy is anything the person wishes to keep to themselves. This can be anything from their name to their medical records. With the information age, data has become more and more portable as it is stored in various methods. This data is vulnerable to theft or loss during information exchanges between networks. I would want any person at my company to practice security hygiene to ensure that the company, our employees, and our customer&#8217;s data is safe at all times, abiding by the CIA triad framework and NIST policies.<br><br><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Digital Values and Social Impacts of Cybersecurity<\/h1>\n\n\n\n<p>I would be indifferent if I didn\u2019t believe from my research that every use of a technical system has a social impact on society at some degree of risk to people and businesses. Often this is a benign impact, as in the case of email or adopting social media at work to appease a work-life balance for employees. In some cases, the social impact will be wide-ranging. An example of a widespread impact is the harassment that employees can have through those mediums as retaliation for reporting an incident at work. One of the least studied technical systems in terms of its social impact is cybersecurity, and yet it has had and will have a large influence on society in the future. Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access. In a computing context, security includes both cybersecurity and physical security. Cybersecurity objectives include the protection of information and the prevention of theft and corruption of data. Addressing the human factor in cybersecurity requires a multi-faceted approach that includes education and training, implementing strong security policies and procedures, enforcing least privilege access controls, regularly updating systems, and fostering a culture of security awareness within the organization. Ultimately, cybersecurity is not just a technological issue; it\u2019s also a human one that requires attention at all levels of an organization. &nbsp;&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>Cybersecurity is important because the information stored on computers is a valuable resource. Information is the valuable data that an organization has as the result of performing some function, and information is subject to a reduction in quality if its confidentiality, integrity, and availability are not maintained. A case can be made by looking at a company that has a competitive advantage because it has devoted effort into developing a certain technique like Telsa, which is the Model T of our day, for developing electric vehicles. This company would not want the information relating to their building technique to be revealed or stolen. This would constrain the company\u2019s progress as it would lose some of the data, and its investors would be impacted by the loss of that proprietary data. Information, which is knowledge, is viewed as power from board rooms to battlefields, and once it&#8217;s lost and sold to anyone looking to exploit that information, it can have detrimental impacts on society from an economic perspective. Cybersecurity helps to protect information by focusing on the triad: confidentiality, integrity, and availability. This is common in information security system framework development and integration of protection protocols to protect our users. The basic goal is to protect information by ensuring that only those granted access can view the information and maintain ethical digital boundaries that protect us from negative impacts that could be, in some cases, life or death.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">References<\/h1>\n\n\n\n<p>Pratt, M. K. (2022, August 2). <em>The importance of data security in the enterprise.<\/em> From techtarget.com: https:\/\/www.techtarget.com\/searchsecurity\/feature\/The-importance-of-data-security-in-the-enterprise<\/p>\n\n\n\n<p>Qassim, Q. S. (2019, Jan). <em>J. Physics Conference<\/em>. From IOPSCIENCE: https:\/\/iopscience.iop.org\/article\/10.1088\/1742-6596\/2261\/1\/012019\/pdf#:~:text=Unprotected%20communication%20protocols%20and%20channels,open%20computers%20and%20communication%20networks.<\/p>\n\n\n\n<p>Stoesz, K. &amp;. (2018). <em>American Social Welfare Policy: A Pluralist Approach.<\/em> New York: Pearson.<\/p>\n\n\n\n<p>Swisher, J. (2024, February 23). <em>How Weak Passwords Expose You to Serious Security Risks<\/em>. From Jetpack: https:\/\/jetpack.com\/blog\/weak-passwords\/#:~:text=Weak%20passwords%20open%20the%20door,legitimate%20user%2C%20or%20disrupt%20operations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF Every Industry that uses technology to exchange data must protect, ensure its accuracy, and have efficient access to its information. The CIA Triad is a fundamental concept in cybersecurity that provides a starting point for that framework. Thus, understanding the utility of these three principles is the foundation for creating a robust security foundation&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/renardheath\/2024\/04\/23\/digital-values-impacts-on-business\/\">Read More<\/a><\/div>\n","protected":false},"author":28669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/renardheath\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/renardheath\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/renardheath\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/renardheath\/wp-json\/wp\/v2\/users\/28669"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/renardheath\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/renardheath\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/renardheath\/wp-json\/wp\/v2\/posts\/294\/revisions\/295"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/renardheath\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/renardheath\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/renardheath\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}