Discussion Board – The “Short Arm” of Predictive Knowledge
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?
My Thoughts:
If I were to fully to agree with Jonas’ view of taking a grounded, ethical, and safer approach to how we address the emerging technologies, especially those with a more complex moral compass, then I’d say that as we continue to develop these technologies, we should also split our forces into developing the technologies or policies to combat them as well. To expand, I mean that in order to try and keep a “mindful approach to advancement” then we have to be able to really get down and examine what it is we are creating. Although, I also have half a mind to understand what the other side might use to defend our constant stride towards advancement in technology, which is that if we don’t make it first, then the enemy could and we don’t want them to use it against us first. Taking the quantum computer for example, there were talks about how it could be used to advance ours or other parties ability to completely dismantle what we know and use for cryptography. Knowing that, we’re not going to stop trying working towards it because we know that the next guy won’t stop either, so it is kind of always a race for who gets it first and its better to know that it is us rather than the next guy. So to sum it all up, I do think that in a perfect world there would be a work force separately working towards policy to safeguard our people as we continue to advance our tech so there is a balance in defense and offense, but I also think that there’s a reason we try so hard to get these technologies first, and I understand that we’d rather be the ones to possess these things instead of someone who would potentially use it against us.
Write-Up – SCADA Systems
In this write-up you may use the SCADA Systems article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.
My Work
Securing Critical Infrastructure: The Role of SCADA Systems
BLUF: SCADA systems allow for better monitoring and data control, but their numerous weaknesses call
for the need to have ever-adapting strategies for defending critical systems.
Understanding Vulnerabilities in Critical Infrastructure
Critical infrastructure is considered things like water treatment plants, gas pipelines, and power generators and due to their importance and need for reliability and availability, they are incredibly reliant on industrial control systems like supervisory control and data acquisition (SCADA) systems. And while SCADA systems are meant to help operational efficiency by providing monitoring and control, they also tend to introduce a number of cybersecurity vulnerabilities. Common ones include the lack of patch in software, remote access not being secure, no true and reliable authentication system, a lack of network segmentation, and a big one being the use of outdated operating systems. All of these vulnerabilities can lead to a great risk of being exploited by bad actors to disrupt or even take hostage of these essential services, which could lead to a severe crippling of the economy and societal efficiency.
SCADA Applications in Risk Mitigation
Even though they come with their vulnerabilities, SCADA systems still have a crucial role in defending against risks that are usually associated with critical infrastructure. By allowing for real-time data acquisition and control, SCADA systems help operators to better detect anomalous actions/events, then,
in turn, respond to those incidents, and bring back up system integrity. Implementing security in SCADA applications, like regular software updates, actual secure remote access, strong authentication systems like 2 factor or multi-factor, and comprehensive network segmentation, can lead to significantly reduced risk to threats for these systems. On top of that, adding intrusion detection systems that are made specifically for SCADA, would enhance one’s ability to safeguard against attacks.
Conclusion
The integration of SCADA systems into critical infrastructure can introduce both opportunities and challenges for those that use and rely on them. While on one hand, they offer better control and monitoring, their vulnerabilities call for a need for an adaptive approach to cybersecurity. By understanding the weaknesses of SCADA and including targeted risk management strategies, organizations can count on SCADA applications to not only optimize efficiency in operations but also fortifying their defenses against the ever-evolving strategies of cyber threats.
References
● “Cybersecurity of Critical Infrastructure with ICS/SCADA Systems,” IEEE Public Safety. ● “10 Strategies to Fortify SCADA System Security,” LevelBlue.
● “Enhancing SCADA Security: Developing a Host-Based Intrusion Detection System to Safeguard
Against Cyberattacks,” arXiv.
Discussion Board: Ethical Considerations of CRISPR Gene Editing
Based on your readings related to the BioCybersecurity section of this course, identify possible ethical considerations and explain your position.
My Thoughts:
BioCybersecurity can be considered a double edged sword when it comes to security and advancement in technology. On one hand, biotechnology would add a significant improvement to healthcare and other related fields where modifying DNA can save or protect others, but on the other hand, the risk from attackers being able to get their hands on the personal data of someone’s DNA could lead to unresolvable exploits. Take for instance, bioterrorism and the amount of damage one could do to their targets if they were able to modify genetic data at their whim. Unlike a SSN, the DNA you come with is given since birth and it can not be as easily replaced as a lost SSN. It would be like losing your entire being if someone were to access your data without you knowing and should everything move towards biotechnology, then your life would almost certainly be in shambles. That’s why I, personally wouldn’t involve myself in it, even though Genomic advancements can lead to things like personalized medicine, early disease detection, and a faster advancement in research in health.