How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world?: Technology actively and primarily plays a role in shaping human behavior; this is more apparent the more time goes on. As well as society becoming…
Author: jbelc013
The “Short Arm” of Predictive Knowledge
How should we approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge?: Modern technology lets us act on a scale that affects the whole world for a long time, sometimes in ways we cannot undo. Because technical innovation now shapes so much of life, our moral thinking must guide how…
SCADA Systems and Their Importance
Written by Chance BelcherCritical Infrastructure Systems depend on network-controlled environments. This leads tomany weaknesses, which the implementation of SCADA Systems will address. Issues such asinsecure RTUs and PLCs, as well as malware infections and host system compromise, are allsolved with SCADA. Critical Infrastructures VulnerabilitiesModern critical infrastructure systems typically use IP-based networks and WANconnections. While this…
CIA Triad Write Up
The CIA Triad is a foundational system used in the Cybersecurity field, and serves as a guide to protecting data or systems. It has three main components, hence the triad, that allow for superior security. Confidentiality, Integrity, and Availability are the three components of the CIA Triad, they all work together to help organizations and…