Discussion Board Assignments!

Discussion #2
“Framework” is a series of documents that provides guidelines and regulations to best maintain cybersecurity risk. It’s useful because it helps you manage your cookies and also provides tools to help cover, create, and update. The five core activities that are listed inside the framework include  Identify, Protect, Detect, Respond and Recover. The Identify function assists in developing an organizational understanding to managing cybersecurity, risk to systems. The Protect function displays safegaurds  to contain the impact of potential cybersecurity events. The Detect function ensures timely discovery of cybersecurity events. The Respond function, as self explanatory, contains appropriate measures to take in response to a cybersecurity risk. The Recover function consists of different strategies that can be used to recover anything that was impaired due to cybersecurity incidents.


Discussion #3
1. The triad consists of Confidentiality, Integrity, and Availability. Confidentiality is a privacy insurance so that your information is kept safe. Integrity is the assurance that the information being accessed hasn’t been altered. Availability means that the information can be easily accessed and modified from those approved. 

2. Authentication is used to ensure that the person assessing something is truly who they are.

3. This is when you combine two factors of security to protect your account. Such as having a 4 digit pin and a RSAsecureID.

4. With this, instead of giving users access rights to an information resource, users are assigned roles and then those re assigned the access. 

5. Encryption is the process of encoding data so only the authorized person can read it. A computer program encodes the text. 

6. Pretexting occurs when an attacker calls a helpdesk or security administrator and pretends to be a particular authorized user having trouble logging in. They can convince the help to reset your password.

7. To ensure all the organization’s information is kept secure and safe. The components include a full understanding of the organizational information resources, regular backups of all data, offsite storage of all data, and lastly a test of data restoration. 

8. A firewall protects all company servers and computers by stopping packets from outside the organization’s network that do not meet a set of criteria.

9. Theres a soft and hard firewall. Software firewalls run on the operating system and intercept packets as they come. Hard firewalls are devices connected to the network and filters the packets based on a set of rules. 

10. The protection of the actual hardware and networking components that store and transmit information resources. An organization must identify all vulnerable resources and take measure to ensure these resources cant be tampered with.

Discussion 5
The impacts of security breaches on a company include the cost of lives, companies closing down immediately,  long lasting effects on the environment, and also it can result in the loss of a product or service. Organizations are not prepared for this type of threat. Due to having partners in other businesses, this creates more loopholes and way more ways for threats to occur. Threats on Industrial cybersecurity are very profound and can truly devastate a lot.

Discussion #7
FIDO is a set of technology-agnostic security specifications for strong authentication, created by FIDO Alliamce. This organization seeks to standardize authentication at the client and protocol layers. 

Discussion #9
The impact cyber technology has had on engineering systems have been so profound. It truly revolutionalized how we approach things electrically and how they help us through the world. For instance, computer science researchers are making major breakthroughs with embedding. Year after year, scientists have pioneered a way that can help develop for the future advancement of technology.

Discussion #10
There isn’t a written section of writing that clearly states the differences between those two subjects but if someone intentionally and deliberately steals someone’s information whether it’s personal or financial and uses it for their own intentions is a criminal offense. It is stated in the law for Identity theft. The comparison between the two aren’t as close as technology advances five times faster than we’re able to contain the crime level. 

Discussion #11
“Does this constitute cyberwar?” No” because cyberwar is potentially as  dangerous if  not more than a regular war. Yes because sometimes extreme measures need to be taken when you are running out of options. The political aspect of this includes threats etc over the internet and the ethical could typically be viewed and represented as blackmail. 

Discussion #12
COLLAPSE

The need for this is driven off many factors. Those factors include mission, business, and a spectrum of other objectives and concerns. Because these factors may constantly change rather than staying dormant, the sense of security always will fluctuate with it therefore causing you to be a step ahead in order to secure the systems you have and are protecting. Furthermore, the need for this is required seeing as a disciplined and structured engineering approach to achieve any expectation thats out of human ability.

Discussion #13

It’s allowed more jobs to become readily available for others to take. It creates a more competitive environment to where more employees strive to work harder in order to get recognized and also so there job won’t be taken away from them for no reason. Cyber technology has absolutely advanced the world and is one of the biggest influences in society.