Prompt: How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world? PLEASE SEE RUBRIC for grading details. BLUF: I will be discussing how we should be regulating and limiting markets, businesses, groups, and individuals when in the face…
DISCUSSION BOARD: Protecting Availability
Prompt: In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)? The protections I would implement to ensure availability of my systems would be to follow the National Institute of Standards and Technology (NIST). By using strong countermeasures we can ensure that…
CIA Triad: Authentication vs. Authorization
BLUF: I will discuss the CIA Triad and the difference between Authentication andAuthorization.CIA TriadAccording to Wesley Chai’s article, the CIA triad, also standing for ConfidentialityIntegrity and Availability, is a framework policy used in Information security to maintainsecurity and is crucial in cybersecurity. CIA is sometimes also called the AIC triad to avoidconfusion with the Central…