The “Short Arm” of Predictive Knowledge

When we think about creating cyber-policy today, Jonas’s point about our limited ability to predict the future feels especially relevant. Digital systems grow and spread so quickly that even the people designing them often don’t fully understand how they’ll affect society years down the line. Jonas argues that this gap, our huge technological power but…

Opportunities for Workplace Deviance

Cyber technology has changed the way we work, but it’s also made it a lot easier for people to slip into questionable behavior without anyone noticing. When so much of our daily work happens online, it doesn’t take much for someone to misuse information or hide what they’re really doing behind a screen. I noticed…

Components of a Business

Hello!The components of a business are listed below. -Research and Development -Customer Service -Legal -Procurement -Project Management These roles set a clear vision and strategy that will move the organization in the direction planned.I like to consider IT the back bone of an organization and helps it run smooth. The IT department touches every single…

Cyber Roles & Responsibilities

One critical role outlined in NIST 800-12 is the System Administrator. This individual or sometimes an entire team that is responsible for setting up and maintaining systems or specific components of those systems. Their work often includes installing and updating software and hardware, managing user accounts, ensuring regular system backups, recovering data when needed, and…

Discussion Board: The NIST Cybersecurity Framework

Hello everyone! I think organizations can gain a lot from using the NIST Cybersecurity Framework because it gives them a clear, flexible way to understand and manage cybersecurity risks without having to start completely from scratch. One of the biggest benefits is that it helps align cybersecurity activities with business goals which makes it easier…