An Argument for Unrestricted AI

An Argument for Unrestricted Artificial Intelligence at ODU The following is a formal letter and rhetorical analysis addressed to the Provost and Executive Vice President for Academic Affairs regarding artificial intelligence integration in the university curriculum. Dear Dr. Payne: I am writing as a second-semester freshman majoring in cybersecurity at Old Dominion University, with plans…

Vulnerabilities in SCADA Systems

Vulnerabilities Associated with Critical Infrastructure Systems and the Role of SCADA Applications in Mitigating These Risks Critical infrastructure systems, including power grids, water treatment facilities, gas pipelines, and transportation networks, face significant vulnerabilities stemming from their dependence on legacy Supervisory Control and Data Acquisition (SCADA) technologies originally designed without modern cybersecurity in mind. [cite: 142,…

The CIA Triad

The CIA Triad The CIA Triad is a cybersecurity model that guides information security policies, comprising three interconnected principles: Confidentiality, Integrity, and Availability, sometimes referred to as the AIC Triad to avoid confusion with the Central Intelligence Agency. [cite: 268, 269] According to the Chai article, it helps organizations develop focused security strategies, although experts…