CRISPR is a gene editing weapon that allows for rewriting of individual cells DNA sequences. DNA is a highly intimate and in most cases, private case in which the tampering with can EASILY kill or severely harm an individual if rearranged with malicious intention. Even in a scenario in which gene editing allows for medical improvements, which I do acknowledge, the changing of DNA sequences can damage the human races concept of individuality. By prioritizing “Ideal” human genes and allowing for customization, the lines between human beings can easily become blurred, and so I believe that while there can absolutely be positive applications for the manipulation of genes, it is crossing an ethical line and should be explored with delicate care, if at all.

The CIA triad refers to a group of three of three core values that make up the model that the CIA triad refers to, with these three core values being confidentiality, integrity, and availability.
Confidentiality refers to and ensures that information is not too readily available for everyone. Integrity provides assurance that any information available is both trustworthy, and accurate. Lastly, availability refers to the ease at which people can access information that they are allowed to by those authorized. Authentication acts as simply verifying a persons identity, such as reviewing an ID to gain clarity on this. Authorization however, depicts which privileges and
actions a person can take. Like an employee being authorized by their boss to be able to train new hires.

One of the major vulnerabilities of Critical infrastructure systems is human oriented attacks. Cyber attacks, terrorist attacks, and product tampering are all examples of human interference causing threats within critical infrastructure. Because of the link between assets and the critical infrastructure systems, massive losses can be suffered from these vulnerabilities being attacked or any attempts to expose these vulnerabilities. This is where SCADA systems come in. SCADA
systems are centralized systems in which both control and monitor sites of interest associated with the critical infrastructure systems. SCADA systems are most often incredibly complex, as to
encompass many possible risks and threats. When issues are detected, SCADA system most often has an alarm associated with it, to alert those in charge of overseeing to the inherent
issues. The data on functions is given from SCADA to HMI, which essentially just gives the data to a human operator. From there, not only are risks easier to detect, but they are also quicker to
act upon, as the link from SCADA system to HMI allows for smooth, efficient, mitigation and risk management.