Discussion Boards
Discussion Board #1
From your readings of pages 1 – 21 of the NIST Cybersecurity Framework Links to an external site., what benefit can organizations gain from using this framework, and how would you use it at your future workplace?
Stability is one of the main benefits that comes from implementing this framework. The company using the framework will be able to assess any risks and evaluate any problems that relate to cybersecurity. Analyzing areas of improvement within the company will be able to consistently assess the risk management within the company. The knowledge that the company gains through risk management allows the company to identify where the weak points are. Being aware of the weak points allows for companies to communicate with potential investors interested in the company at its current state or inquire to invest in the company to make it better. In my future workplace, I would use the framework to have a solid cybersecurity system and allow for employees and others involved within the company to feel secure with any disclosed information they provide. I would also use the framework as a risk management tool to identify how the company is operating with the current format of the company. The framework will be used to make improvements to the company if needed.
Discussion Board #2
In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?
If I was a CISO for a company, I would make sure that I have a plan in case a breach or system hacks occurs. I would make sure to manage and evaluate the system to make sure there are no access points exposed to allow for hackers to penetrate the system. I would make sure that if there was a breach or hack that there is a solution for the problem to be solved. The system will alert all people with access to be alerted if there is any malicious behavior occurring. I would also have another internet line which is only exclusively accessed by my permission only to allow for recovery of the system as a backup option. Having this backup internet line will ensure that the system can still be recovered if the hackers shut down the main internet line.
Discussion Board #3
Based on your readings related to the BioCybersecurity section of this course, identify possible ethical considerations and explain your position.
Malicious Code Written into DNA Infects the Computer that Reads itLinks to an external site.
Hacking Humans: Protecting Our DNA from CybercriminalsLinks to an external site.
Malicious code can be written, and a sequence of DNA can be uploaded to a computer and infect it. This is an example of how vulnerabilities in cybersecurity are spreading and affecting our society. The use of the CRISPR gene editing tool opens up new ways and opportunities to cure illnesses and develop life. Although these new opportunities are occurring, they put medicine practices at risk. DNA could be used to tell machines how to run. The CRISPR editing tool could be manipulated to cause harm and mess up DNA coding. DNA could be coded to destroy specific molecules and materials that people use on a daily basis. The possibility for gene editing to offer new technological advancements could be compromised with malicious new inventions created by hackers. These types of vulnerabilities are similar to what computers and operating systems face and could cause difficulty in the future.
Discussion Board #4
How has cyber technology created opportunities for workplace deviance?
In the realm of cyber technology, workplace deviance can occur online rather than face-to-face, making it more challenging to detect. For instance, an employee who is dissatisfied with the company may act out by sabotaging their workplace due to a problem they faced, resulting in being job loss and potentially missing out on promotions. Another example of workplace deviance is when an employee, fearing termination, steals sensitive information from the company to sell to rivals for financial gain. If the company has not restricted the employee’s access to confidential files, this person could continue to harm the organization. Cyber technology has created new opportunities for workplace deviance, making it more difficult for companies to detect misconduct and easier for employees to misuse digital resources.
Discussion Board #5
From this week’s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?
In this week’s Jonas reading, there must be a balance between expecting a potential issues and remaining flexible. It is very difficult to predict what future challenges could occur. The guidelines provide a base to adapt as challenges appear. The goal is to generate regulations that highlight key priorities. Protecting essential assets, maintaining functionality, as well as ensuring that systems remain strong and are open to new modifications and information. The focus for the system is to ensure that it can undergo conditions that occur unexpectedly. It is essential to implement protection consistent updates and preventative barriers to enhance the durability of the system. It is necessary for anyone involved within the system to receive regular training to verify that each person involved understands their role. The development of policies and guidelines should be flexible and dynamic because future risks are unpredictable.
Discussion Board #6
How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world?
After reviewing Verbeek’s writing, I have concluded that individuals should be regulated differently. Markets should encourage competition and prevent monopolies, and they need to be monitored to ensure that prices remain fair and consumers are not taken advantage of. Regulations should be implemented to promote ethical and responsible practices, preventing consumers from facing exploitation and manipulation. To enhance accountability and transparency, organizations should also be regulated. These regulations will ensure that discrimination is not tolerated. Individuals must be held accountable for their actions and behavior. By implementing these rules, we can guarantee that the rights and privileges of everyone are protected and valued.