Write up: The CIA Triad

Evan Potts 4/22/2023 IT200T Professor Duvall Instructions Using the Chai Article (Links to an external site.), along with additional research you will conduct on your own, describe the CIA Triad, and the differences between Authentication & Authorization, including an example. What is the CIA Triad? CIA Triad stands for Confidentiality, integrity, and availability sometimes referred to as…

From Verbeek’s writing (Mod 7, Reading 4) Designing the Public Sphere: Information Technologies and the Politics of Mediation

Evan Potts 4/22/2023 IT200T Professor Duvall Instructions How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p.217) and networking of the material world? In the reading Peter-Paul Verbeek shares his viewpoint on technology being implemented in the modern world and how…

Write Up: SCADA Systems

Evan Potts 4/22/2023 IT200T Professor Duvall Instructions In this write-up you will use the SCADA Systems Links to an external site. article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.