top of page

Competency C

Demonstrate strong understanding of security and ethics issues related to informatics, user interface, and inter-professional application of informatics in specific fields by designing and implementing appropriate information assurance and ethics and privacy solutions.

Introduction

In recent years, fields related to the protection of information, such as cybersecurity, have  increasingly gained more attention in the public eye. Notorious cyberattacks; such as The Lazarus Heist, Yahoo! Breach, Epsilon Email Hack, and the Ukraine Power Grid Takedown; have had massive implications on businesses, individuals’ personal information, and public infrastructure (NordVPN, 2021). With the increased reliance on technology used in daily life, concerns regarding privacy and cybersecurity are in the public interest. Though cybersecurity often gets the most attention by the public and in popular culture, there are other disciplines that deal with the protection of information: these other fields include information security and information assurance.

 

Moore (n.d.) explained that while some use the terms cybersecurity, information security, and information assurance synonymously; there are some key differences between each, however all the terms are interrelated: “[c]ybersecurity is a sub-set of information security, which itself is a sub-discipline of information assurance, which encompasses higher-level concepts such as strategy, law, policy, risk management, training, and other disciplines that transcend a particular medium or domain” (as cited in Telos, para. 13). The focus of cybersecurity differs from information assurance because the emphasis on cybersecurity is more around protecting information found on internet-connected digital devices, whereas the emphasis on information assurance is broader with the concern of protection of information in both electronic and physical form. Though there are some differences on what is being protected “[b]oth involve risk management, maintaining and safeguarding the high-tech information systems that are now used across all industries (commerce, banking, telecommunications, health care, national security and more) to store, process and distribute essential data” (Moore, n.d., para. 2).

 

Because cybersecurity, information security, and information assurance all protect information, it is critical that informaticists understand these disciplines: Competency C encapsulates this need in the field of informatics. Competency C stresses the need for an informaticist to understand concepts such as security, ethics, information assurance, and privacy; and the competency emphasizes a need to be able apply these concepts in practice to solve industry problems. The terms privacy, security, and ethics come up frequently in discussions related to fields like cybersecurity: these terms all relate to the protection of information, however each refers to something distinct. Privacy is defined by “the control that you have over your personal information and how that information is used,” security is related to “how protected your personal information is,” and “ethics are principles of behavior based on ideas of right and wrong.” (Bogna, 2021, para. 3; Sebastian-Coleman, 2018, Location 519).  

Discussion

Throughout my time in the informatics program, I have been exposed to disciplines dealing with the protection of information like cybersecurity, information security, and information assurance and concepts like privacy, security, and ethics in both my core classes (INFM 200-208) and in the specialization courses: these courses include INFM 200, INFM 202, INFM 203, INFM 206, INFM 208, INFM 210, and INFM 216. While there are several examples of encounters with Competency C in my course work in the classes mentioned above, here I will focus on examples of my work in INFM 200, INFM 202, and INFM 208 which satisfy the competency.

Evidence

Here, in this section, I present three pieces of evidence that demonstrate Competency C which include the following: a research paper on information collection, cybersecurity, and privacy of autonomous vehicles (INFM 200); a risk assessment assignment identifying assets in my home and details of security controls to protect those assets (INFM 208); and a class discussion around Verizon’s breach report (INFM 202). All three pieces of evidence have similarities in that the central focus is on the protection of information.. Though protection of information is a common theme in each of these pieces of evidence, each assignment has a different application of this theme (i.e. the INFM 200 assignment has a specific and technical focus towards describing and providing solutions for information collection, cybersecurity, and privacy of autonomous vehicles; whereas the Verizon breach discussion assignment has a more general focus on observing cyberattack trends across different industries).

 

In my first piece of evidence; the INFM 200 research paper on information collection, cybersecurity, and privacy of autonomous vehicles; I reviewed and analyzed some of the current literature around the concerns over protection of information in autonomous or self-driving vehicles and proposed solutions to remedy some of these concerns. Before I wrote this paper, I had a personal interest in some of the developments in autonomous vehicle technology such as Tesla’s Full Self Driving Beta software and the field testing of Waymo’s robotaxi service out in the Phoenix, Arizona area. Currently, many of the discussions around autonomous vehicles revolves around their safety, adaptability to changing road conditions (i.e. vehicle performance in inclement weather), scalability, and hardware developments. Though safety is a pressing concern, one of the areas that I was interested in exploring were the implications of information collection, privacy, and cybersecurity of autonomous vehicles which are less discussed by the public day-to-day. During the research and writing phases for this paper, I discovered that autonomous vehicles have the potential to collect a very large amount of Personally Identifiable Information (PII) about individuals and their whereabouts and that there are major cybersecurity concerns with these vehicles since an attack can lead to potentially lethal consequences. With these issues of the potential misuse or abuse of PII and cybersecurity implications, I highlighted and analyzed the current literature around the issues and solutions on the ethical, privacy, and cybersecurity implications of autonomous vehicles: some of the solutions to these problems include but are not limited to implementing Privacy-by-Design to protect PII and generating cybersecurity awareness among vehicle users to prevent cyberattacks. I felt that the solutions were important for me to include because we will likely need to employ some of these concepts as autonomous vehicle adoption becomes more widespread as the technology matures. This paper demonstrates Competency C because it takes informatics issues dealing with security, ethics, and privacy and applies them to a real-world field (e.g. transportation).

 

In my second piece of evidence, the INFM 208 risk assessment assignment identifying assets in my home and details of security controls to protect those assets, I took an inventory of the different assets in my home, analyzed the different threats to those assets, assessed current security controls that are currently employed to protect the assets against threats, and designed future strategies to help implement more security controls to mitigate risk even further. This assignment had a major focus on risk management and information assurance (e.g. satisfies the information assurance part of Competency C). When doing the work for the assignment, I had an opportunity to think like a business performing a risk assessment by classifying the different assets in my home into three general categories: physical assets, information assets, data and information assets, and information technology assets. After identifying these assets, I needed to assess the potential threats that could bring harm to these assets and think about the degree that a compromised asset could impact my household, this reflects ways that businesses measure risks before making organizational decisions. With an understanding of the threats and their impacts, I also had the opportunity to think about how I am currently lowering my risk of asset compromise, with the introduction of security controls, and what strategy I intend to use to protect these assets even more in the future (i.e. putting a data and information asset such as financial documents in a fireproof/waterproof safe helps reduce the risk of unauthorized access and physical damage). Though I already mentioned that this assignment satisfies the information assurance part of Competency C, it is also concerned with privacy, security, and ethics since several assets, particularly the data and information and information technology assets, contain sensitive information. The ethical practice of keeping this sensitive information confidential, via the use of security controls, guards against misuse and abuse of the assets by bad actors.

 

In my last piece of evidence, the INFM 202 class discussion around Verizon’s breach report, I was able to explore the nature of cyberattacks, in general, across several different industries. The report being analyzed in this discussion is Verizon’s DBIR which features recorded data on breach incidents. When I was finished working on this assignment, I learned about some of the common trends that leads to a data breach; for example, external bad actors breach organizations for the purpose of financial gain, most often by using social engineering tactics (e.g. tricking a user into giving away personal information or downloading malware). I was also surprised to learn that many data breaches occur by internal actors, like employees or system administrators, by mistake (i.e. someone in the organization sends an email containing confidential information to the wrong email address). After studying the different ways breaches can occur, I was tasked with recommending security controls that could help mitigate the effects of cyberattacks: in my opinion, one of the most important security controls that I recommended was a focus on user education, since the majority of breaches relied on human error as the main vulnerability (i.e. breaches caused by social engineering from external actors and mistakes from internal actors). After submitting an initial analysis of Verizon’s DBIR, I had the opportunity to open a dialogue amongst my peers in the course to compare and contrast ideas about the report. This piece of evidence demonstrates Competency C because it is concerned with security and privacy of protecting information across different industries and allowed me a chance to address those concerns with appropriate solutions.

INFM 200 Research Paper

INFM 208 Risk Assessment

INFM 202 Verizon DBIR Discussion

Conclusion

Overall, the three pieces of evidence included here that demonstrate Competency C introduced me and allowed me to apply different aspects of cybersecurity, information security, and information assurance to specific fields. In my INFM 200 paper, I was able to explore the literature on a current issue with autonomous or self-driving vehicles and their impact to the privacy of individuals and synthesize and analyze these ideas to both get a better understanding of the topic and to form an opinion. My INFM 208 paper gave me an opportunity to practice real-world skills of identifying and assessing risks, as well as designing long-term strategies of how to best move forward. The Verizon DBIR assignment gave me a chance to research and analyze current cybersecurity trends and promote meaningful discussion between me and my fellow peers.

References

Bogna, J. (2021, November 22). Privacy vs. security: What’s the difference?. How-To Geek.

https://www.howtogeek.com/765272/privacy-vs-security-whats-the-difference/

 

Moore, M. (n.d.). Information assurance vs. cybersecurity. University of San Diego.

https://onlinedegrees.sandiego.edu/information-assurance-vs-cybersecurity/#:~:text=%E2%80%9CCybersecurity%20is%20a%20sub%2Dset,a%20particular%20medium%20or%20domain.%E2%80%9D

 

NordVPN. (2021, October 22). 5 of the most notorious cyber attacks of our time [Video].

YouTube. https://www.youtube.com/watch?v=-uKXI4fsCfY

 

Sebastian-Coleman, L. (2018). Navigating the labyrinth: An executive guide to data management

[Kindle edition]. Technics Publications. Retrieved from Amazon.com

MS Informatics e-Portfolio

Copyright © 2022 Joshua Engel 

bottom of page