Exploring Attacks on Availability: How Losing Access Can Cost Everything

Exploring Attacks on Availability: How Losing Access Can Cost EverythingWhat is an availability attack?An availability attack is a class of cyber attacks that limit the accessibility and availability of a system by overloading a system through ransomware or viruses. A common example of an availability attack would be when hackers will overload a system where…

Discussion Board: The “Short Arm” of Predictive Knowledge

The “Short Arm” of predictive knowledge implies that we have limited knowledge and unpredictability when it comes to technology. Cyber policies have to implement policies that adapt to the unpredictable nature of technology and how hackers come up with newer and smarter strategies for attacking systems. Flexible plans can help stop plans before they start…

SCADA Systems: How They Keep Our Critical Infrastructures Safe

Critical infrastructures run our country and make life more comfortable and accessible. Like any other systems big or small, they face many risks for shutting down and putting people’s livelihoods at risk. SCADA systems maintain these infrastructures and keep these risks at bay to protect the technology that allows people to live safely and comfortably.Risks…

Discussion Board: Opportunities for Workplace Deviance

While cyber technology has opened many doors to improving how we do our jobs, it has always come with opportunities to commit workplace deviance. With unrestricted access to the internet on work computers and other devices, it is easy for employees to log onto websites that are inappropriate for work such as Facebook, Amazon, or…

Hacking Humans: How Invasive is Collecting DNA for People?

Hacking Humans: How Invasive is Digitizing DNA?SummaryOvertime, DNA extraction and testing has evolved tremendously where people have found ways to utilize it to cure genetically based diseases, but with progress comes new methods for people to exploit others. The newest innovation in preserving DNA is through digitization which has so much potential for medical and…

Discussion Board: Ethical Considerations of CRISPR Gene Editing

I feel like researching how DNA can be digitized and the various impacts could have ethical concerns with both researchers and their subjects. For the subjects, while I know they would give researchers their consent to extract their DNA for digitization, I feel like the risk of exploitation would be a massive breach of privacy….

Write Up: The CIA Triad

The CIA Triad: Keeping Your Organization’s Information Safe The CIA Triad has protected organizations and their data with their carefully crafted set of guidelines and principles. While many claim they need improvement, they have set the standards on how clients can keep their information and in their control. Clients also learning what the differences of…

Disscussion Board: Protecting Availablity

I would enforce a policy for all my employees to use strong passwords that would make it more difficult for any outside forces to access sensitive information within the company. Alongside using strong passwords, I would require all employees to use a two-factor authorization token such as sending a text to their phone or scan…

Write Up: Components of a Business

The Components of a Business and How IT Plays an Integral Role in Maintaining a Business All businesses follow an organization of their components that allow their business to thrive; however, none can succeed properly without Information Technology to support all their departments. IT allows for a business’s processes to run efficiently in all departments…