-
Stephanie H. Kwiatkowski wrote a new post on the site MIS2101 – Spring 2015 9 years, 9 months ago
There is no doubt that in our world today we are virtually dependent on […]
-
Stephanie H. Kwiatkowski commented on the post, Progress Report for Week Ending, September 22, on the site 9 years, 9 months ago
http://www.scmagazineuk.com/trust-company-culture-and-byod-security/article/393267/
“….employees are already using their own devices at work, regardless of their businesses’ official policies on BYOD.”
This is really an interesting article and thought process. I am not sure how I feel about it – I like how the article points out the pros and cons! Looking forward to your thoughts!
I don’t believe the benefits of using crowd-sourcing cyber-security outweigh the negatives. If my security is going to be compromised I would prefer it to be my fault not the fault of someone else, therefore I don’t feel I would ever be able to personally stomach this approach. I do believe it could be helpful in certain situations but as you said in question 2 regarding the Trojan Horse theory, if this becomes a new thing wouldn’t hackers just find a way to act as crowd-sourcing help to hack you from the inside instead of the outside. Interesting article.
I think the idea behind crowdsourcing is interesting and the “strength in numbers” defense seems like a plausible idea. I do think there is always a threat to any cybersecurity operation and the bases behind crowdsourcing does seem to open the possibility that a threat might be successful. By allowing these third parties in, I think could cause more damage than good. But if crowdsourcing limits the probability of a successful attack, it should be something companies (Target, Home Depot, etc.) are looking at regarding cybersecurity.