Discussion Boards:
Opportunities for Workplace Deviance
Cyber technology transformed workplaces around the United States negatively. Every company has employees who will take advantage of their remote work and cloud-based systems in which can lead to it misuse of company resources. That’s bad because it will tank productivity and can cost a lot of money for the company. If the company ever finds out then those employees will be fired on the spot. However, if the misconduct is minor, like browsing social media or online shopping, the company will slap you on the wrist with a warning. During it again, I think it will result in termination from the company. Furthermore, these cyber technology opportunities by companies should be regulated more because locking down the resource access and only allowing granular permissions means employees have to use what they have, cutting the chances of misuse. As expressed, having cyber technology is great, but sometimes regulations are needed to keep the cyber workforce honest.
Protecting Availability
If I were a Chief Information Security Officer of a traded company I would implement the following systems High Availability, Redundancy, Software, and Update Management, and Employee Training in Response to identifying cybercriminals’ activities. For one, the High Availability is to group both databases and apps to ensure servers are operating correctly. This will ensure that servers are being safeguarded from cyber threats. Second, Redundancy is a data backup where if the original data is lost, a backup is made just in case it does. In addition, this will prevent any downtime that will disrupt the server. Third, having Software, and Update Management will help the company be more mobilized with their systems and security. Making the company more efficient and transparent with its customer base about new changes made. And lastly, Employee Training and Incident Response will ensure that employees are trained to identify threats that could cripple the system availability. This ensures that employees know what to look for and what to report. Every one of these protections is critical because this will ensure that business operations and customer trust are being upheld and the company itself under my judication will thrive to greater heights.
Write Ups:
The CIA Triad
CIA Triad is about having basic forms of development within security systems. It is also used to identify mechanisms and vulnerabilities and create simpler solutions. In addition, the abbreviation of CIA stands for, Confidentiality, Integrity, and Availability. According to Fortinet (2023), it said that these segments are the main focal point that helps people in cybersecurity to pinpoint each problem differently and address the concern. In addition, these methods help strengthen the overall security and it makes them more equipped for the next cyber threats they face. This all means that the CIA Triad is the right procedure when dealing with unknown malicious individuals. Furthermore, CIA Triad is so important for cybersecurity because it provides a framework that helps protect personal data from being compromised by unauthorized access, remains untouched and not stolen from hackers, and only the user itself has accessibility to their accounts. Samonas (2014) stated that these basic principles are important to ensure Confidentiality, Integrity, and Availability in all systems are used for coordination. As a final point, the CIA Triad tool in cybersecurity is helpful to organizations to identify and solve security concerns.
Authentication is where a process of action is used to identify the verified user. Like for example
the user puts in their username and password into the login, which the system will recognize the
credentials and allow the user access. For instance, Okta (2018), stated that information is locked away in the form of a key because the system will only recognize the user if they put in the right requirements. It says that users are the only ones to put in the right information to know the information is correct. More from Okta (2018), also noted that the procedure that takes place with authentication is to ensure that passwords, pins, apps, and others are only used by the users. This means every credential has to come from the user, and not someone else. Kim, Hokeun, and Edward A. Lee (2017), mention that in order to establish trust, the company and user must abide by rules that will benefit both of them.
Authorization is when the system itself permits the user access to specific actions or resources. As mentioned by Okta (2018), it explains that authorization is a form of agreement in which the verified user must abide by the company policies before making that decision and granting certain access. Like for example, the person must give their documents to that company to have permission to download a certain file on a server or give the user access to administrative documents. That means the author gave the person permission to look and follow the rules when viewing their documents. Authorization is all about granting people access to view or edit resources with the approval of knowing they’ll follow through with their agreements on the author’s rules.
The key takeaway from all of this is that the CIA Triad, Authentication, and Authorization are key
methods that help make security measures more efficient with networks, data, and systems. With these functions together, it ensures all user data is being guarded with integrity and maintains trust with users in both physical and digital worlds.
Work Cited
Fortinet. “What Is the CIA Triad and Why Is It Important?” Fortinet, 2023,
www.fortinet.com/resources/cyberglossary/cia-triad.
Kim, Hokeun, and Edward A. Lee. “Authentication and Authorization for the Internet of Things.” IT
Professional, vol. 19, no. 5, 2017, pp. 27–33, https://doi.org/10.1109/mitp.2017.3680960.
Okta. “Authentication vs. Authorization.” Okta, 15 Oct. 2018, www.okta.com/identity-101/authentication-/
vs-authorization/.
Samonas, Spyridon, and David Coss. “The Cia Strikes Back: Redefining Confidentiality, Integrity and
Availability in Security.” 2014.