Cyber Security Class Discussion on Infrastruction, Regulations and Framework

in cybersecurity •  6 years ago 

After working 15 hours today only to come home and have to participate in a distance learning discussion, I decided to include you all in the discussion rather than not write an article today, since I was already writing it...


Image by Impervia.com

By: Frank Aiello 6/26/2018

Cybersecurity Framework (CSF), is the Framework that I will be discussing. CSF unlike many of the other frameworks is similar in concept to the open source methodology that has brought the world such achievements as Wikipedia and Bitcoin. Instead of looking for one director to dictate the standards and all else following suit, this framework allows its’ adopters to utilize the collective knowledge of the world. Tapping into a virtual or literal, world of knowledge vise the thoughts of any one is arguably superior to any other methodology, however it does come with some risk. Furthermore the use of this, decentralized framework could be a huge benefit on an international stage where all parties may have different needs, points of view, ideas, and breakthroughs (Wrenn, 2018).
The benefits of international relations when dealing with cybersecurity, is that the need for security on the internet itself is essential in all developed nations for both the government and the citizens as well. Using the CSF framework in this case would be a huge advantage to all parties due to the individuals all coming together to collaborate is like having several engineers come together to build a complex. While each individual in capable of producing a great product on their own, together with each bringing their own style, knowledge and experience will add depth to the project, ultimately creating a complete wonder to the world. However while this framework has many advantages, it is not without flaw.
The pitfalls of the CSF is that it is voluntary, and with no laws enforcing its use there is nowhere to point the blame for legal recourse when the processes outlined by this framework are ignored, or forgotten in instances of human error. Other less important pitfalls of this dynamic is that while crowdsourcing information can as mentioned earlier lead to huge breakthroughs, it can sometimes cause great conflict in the process, but as is the laws of nature it takes pressure and time to create a diamond. One more thing to consider when using crowd sourcing for collaborative projects is that there are those who would try to inject stipulations that would only benefit themselves or even bring about a disadvantage to others (Wagorn, 2014).
In the end the benefits of CSF greatly outweigh the pitfalls but to each their own. Please let me know your thoughts on all of this.
Works Cited
Wagorn, P. (2014, April 8). Idea Connection. Retrieved from https://www.ideaconnection.com/blog/2014/04/how-to-fix-crowdsourcing/
Wrenn, G. (2018, May 2). CSO. Retrieved from https://www.csoonline.com/article/3269532/data-protection/adopt-the-nist-cybersecurity-framework-csf-and-harness-the-wisdom-of-crowds.html

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!