This meme is intended to bring light to the fact that our technology is based around the use of human biology. Function using hands and our basic human abilities completely defines the features and functions we have surrounding our tech. Something as simple as a touch pad has a ton of human design integration behind…
Journal 5 CYSE 201S
The 7 listed Individual Motives ranked from the most sensible (1) to the least (7)
Journal 4 CYSE 201S
Maslow’s Hierarchy of Needs is broken into 5 separate levels. Even level in this journal post will reflect my own personal connections with technology in relation to the Need.
Journal 3 CYSE 201S
PrivacyRights.org provides a tool called Data Breach Chronology which gives visual aids representing publicly available information of data breaches which occur throughout the US. It makes the statistical analysis and makes it digestible for even non cybersecurity professionals to foster education within the country about the rise and number of cyber breaches with occur. This…
Journal 2 CYSE 201S
The principles of science relate to cybersecurity through the same reason that they also would apply to both the natural and social sciences. They are bound by the same scientific rules which are systems operate under. Cybersecurity is no less bound by the principles of science as any other field. For example, a large study…
Journal 1 CYSE 201S
The initial area which draws my career interest is Cyber Defense Infrastructure Support. Working as a fiber optic network technician has shown me the critical nature of protecting infrastructure particularly in the field of network infrastructure. Doing emergency repairs on fiberized networks is a crucial part of my job which highlights the need for effective…
The NIST Cybersecurity Framework
The Framework provides a tangible foundation for which individuals or organizations can conceptualize the virtual systems/processes used in the modern day in regards to risk management through the lens of cybersecurity. It allows an organization to analyze its cybersecurity posture, where they want to be with their cyber defense and its progress, and being able…
Cyber Vulnerabilities in Critical Infrastructure
As infrastructure becomes modernized there has been a shift from constant humanoverwatch to computerized systems and networks which are monitored/managed digitally through SCADA systems. SCADA are industrial control systems (ICS) which “used to control infrastructure processes (water treatment, wastewater treatment, gas pipelines, wind farms, etc), facility-based processes (airports, space stations, ships, etc,) or industrial processes…
Ethical Considerations of CRISPR Gene Editing
CRISPR Gene Editing is one of the most major bioethical issues of the current era. Humans being able to take control over their genome and divert from natures inherent course is a heavy concept. What happens when humans with quantifiable advantages over unedited humans are created with CRISPR? Does that immediately create a caste system…