Cybersecurity Technologies Scenario The authors of the National Security Strategy (NSS) are looking to address technologies that will revolutioniz
APA, 3 pages, at least 2 references. I provided some resources in attatchment.
Part 5: Cybersecurity Technologies
Scenario
The authors of the National Security Strategy (NSS) are looking to address technologies that will revolutionize cybersecurity. They believe that blockchain technology is a revolutionary technology that can significantly improve cybersecurity.
o What would be your recommendation for how the NSS should incorporate this technology to the public?
o Propose exactly what you believe should be written in the NSS. Specifically, explain the blockchain technology in layman's terms to nontechnical people that may be reading the NSS, give examples of how it could be used to provide revolutionary cybersecurity, include examples of how it is being used to provide cybersecurity solutions, and discuss what, if any policies or laws should be established to mandate its use in specific industries.
Part 6: Ethics in Cybersecurity
Ethical issues are at the core of what we do as cybersecurity professionals. Think of the example of a cyber defender working in a hospital. They are charged with securing the network, medical devices, and protecting sensitive personal health information from unauthorized disclosure. They are not only protecting patient privacy but their health and perhaps even their lives. Confidentiality, Integrity, Availability – the C-I-A triad – and many other cybersecurity practices are increasingly at play in protecting citizens in all walks of life and in all sectors. Thus, acting in an ethical manner, is one of the hallmarks of a cybersecurity professional.
o What are the ethically significant harms that may result from mass surveillance (including by government and corporations)?
o What are the ethically significant harms that may result from emerging technologies such as blockchain technology, artificial intelligence, and machine learning?
Resources
Blockchain
People use the term “blockchain technology” to mean different things, and it can be confusing. Sometimes they are talking about the Bitcoin blockchain, sometimes it’s the Ethereum blockchain, sometimes it’s other virtual currencies or digital tokens, sometimes it’s smart contracts. Most of the time, though, they are talking about distributed ledgers, i.e., a list of transactions replicated across a number of computers, rather than being stored on a central server.
The common themes seem to be a data store that:
· usually contains financial transactions
· is replicated across a number of systems in almost real-time
· usually exists over a peer-to-peer network
· uses cryptography and digital signatures to prove identity, authenticity, and enforce read/write access rights
· can be written by certain participants
· can be read by certain participants, maybe a wider audience, and
· has mechanisms to make it hard to change historical records, or at least make it easy to detect when someone is trying to do so
Blockchain and Cybersecurity
Blockchain in the context of cybersecurity attempts to mitigate the weakest link—the human. Some of the earliest attempts to use the blockchain in cybersecurity is in the context of privacy. Consider something as simple as a messaging application. There is a private sector organization called Obsidian that recently developed a secure messenger using blockchain technology. Other uses of the blockchain attempt to render username and passwords for authentication obsolete. Some have even posited that blockchain will provide a means to secure the internet of things (IoT), which we well know has limited cybersecurity mechanisms.
It is important to understand that blockchain is not the panacea of cybersecurity. It is a means to strengthen and evolve current defensive measures.
Blockchain is a term used to describe a decentralized ledger. In essence, it is a grouping of records that ensure integrity and confidentiality through hashing and cryptography. Each grouping is considered to be a “block.” Each block contains a time stamp and data of the previous transaction in the form of a cryptographic hash (Mearian, 2018).
Thus, every time a transaction in the context of its application occurs, the blockchain grows. The blockchain is continuously growing as new blocks (transactions) occur.
One of the seminal works on blockchain is included in the video content below (Institute for the Future, 2016):
https://www.youtube.com/watch?v=r43LhSUUGTQ&feature=youtu.be
Blockchain has received a lot of attention, mostly by creators and users of cryptocurrencies. However, there are many more applications of this technology waiting to be discovered. The cybersecurity field has already begun to implement some solutions to challenges that require integrity and confidentiality.
References
Institute for the Future. (2016). Understand the blockchain in two minutes [Video]. https://www.youtube.com/watch?v=r43LhSUUGTQ
Mearian, L. (2018, May 31). What is blockchain? The most disruptive tech in decades. https://www.computerworld.com/article/3191077/security/what-is-blockchain-the-most-disruptive-tech-in-decades.html
Ethics In Cybersecurity
Ethics in cybersecurity research and practice | Elsevier Enhanced Reader
Macnish, K., & Ham, J. van der. (2020, September 9). Ethics in Cybersecurity Research and Practice. Technology in Society. Retrieved April 29, 2022, from https://www.sciencedirect.com/science/article/pii/S0160791X19306840
,
Part 5: Cybersecurity Technologies
Scenario
The authors of the National Security Strategy (NSS) are looking to address technologies that will revolutionize cybersecurity. They believe that blockchain technology is a revolutionary technology that can significantly improve cybersecurity.
· What would be your recommendation for how the NSS should incorporate this technology to the public?
· Propose exactly what you believe should be written in the NSS. Specifically, explain the blockchain technology in layman's terms to nontechnical people that may be reading the NSS, give examples of how it could be used to provide revolutionary cybersecurity, include examples of how it is being used to provide cybersecurity solutions, and discuss what, if any policies or laws should be established to mandate its use in specific industries.
Part 6: Ethics in Cybersecurity
Ethical issues are at the core of what we do as cybersecurity professionals. Think of the example of a cyber defender working in a hospital. They are charged with securing the network, medical devices, and protecting sensitive personal health information from unauthorized disclosure. They are not only protecting patient privacy but their health and perhaps even their lives. Confidentiality, Integrity, Availability – the C-I-A triad – and many other cybersecurity practices are increasingly at play in protecting citizens in all walks of life and in all sectors. Thus, acting in an ethical manner, is one of the hallmarks of a cybersecurity professional.
· What are the ethically significant harms that may result from mass surveillance (including by government and corporations)?
· What are the ethically significant harms that may result from emerging technologies such as blockchain technology, artificial intelligence, and machine learning?
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.