• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Logic Central Academy

Technological Era Education and Training

  • Contact me
  • Home
  • About
  • Education and Training
    • Cyber Security Courses
      • Cyber Security Career Guidance Series
      • Security Management for Critical infrastructure Series
      • Secure Coding Series
      • Secure Testing Series
    • License Training Material
    • Mentoring
  • Consulting
  • Speaking
  • Categories
    • Business Management
    • Security Management
      • Data Lifecycle Management
      • Trust Management
      • Secrets Management
      • Supply Chain Management
    • Cyber Security
    • Critical Infrastructure
    • Self Help
    • Publications
    • Partners
    • Uncategorized
You are here: Home / Business Management / Accountability Of Data – Video Clip

Accountability Of Data – Video Clip

March 12, 2014 by admin Leave a Comment

Share:
LinkedIn0
Facebook0
Twitter0
Google+0

This excerpt from the course on Security Management For Critical Infrastructure  explains how accountability and human behavior relate to computers and embedded systems.

I posted this clip to support the article release for the March issue of the Security Management for Critical infrastructure series on Fierce Smart Grid.  Accountability of data is essential to the ability to operate electro-mechanical equipment on critical infrastructure networks.

Understanding accountability is essential to understanding cyber security.  Humans make assumptions that everyone in society will following excepted standards for accountability based on moral codes we all learn at young ages. Since a computer cannot have a moral code this accountability must be designed into operation and upheld with trust chains and proof of data operations.

Like every person contributes to accountability of a society, every portion of the eco-system for critical infrastructure must contribute in the same way. A new moral code which covers electro-mechanical systems, logistic networks,  virtual & software systems, and human actors, must be set up. We cannot assume that cyber security will be in somebody else’s hands.

 

Filed Under: Business Management, Data Lifecycle Management

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Christopher Gorog Coffee With Chris Podcast, Listen or join candid talks with the Logic Central Academy Founder. Visit our Media Site.

Connect With Me Online

  • Email
  • Facebook
  • LinkedIn
  • YouTube

RECENT POSTS

  • (no title)
  • Cyber Security needs a Socio-Technological era solution
  • Exciting New High School Concept
  • A Call for Participation in IoT Cyber Research
  • CWC Cyber – Conversation with DHS’s Chuck Brooks

Copyright © 2023 · Genesis Framework · WordPress · Log in