Course Assignments

#1 Discussion Topic: The “Short Arm” of Predictive Knowledge The “Short Arm” of Predictive Knowledge The “Short Arm” of Predictive Knowledge

Humans used to simply need to be prepared for quick, local impacts, as shown by Jonas’s “short arm” of prophetic knowledge. AI, social media, and global connections are examples of contemporary innovations that break this pattern and have long-term, worldwide effects. Infrastructure and cyber-policy must change correspondingly; transdisciplinary planning, proactive, cautious leadership, and moral system design are important. Adaptive policies and scenario modeling aid in controlling risk and averting damage. Moving from short- to long-term responsibility ensures technology serves society safely and ethically, mirroring Jonas’s appeal to widen our prediction horizon in a linked world.

#2 Business Writing Skills – In-Class Graded Exercise

Instruction on the utilization of applications provided by educators at Eleganz. Instruction gotten
by Eleganz workers in a mock center and a classroom. Application Functionality is included by
educators into the mock command scenarios in an effort to simulate real world crises.
Meaningful feedback on teachings is maintained by instructors in Ms Excel spreadsheet.
Recommendations for improvement are prioritized by assistant directors. Feedback on teachings
is gotten by instructed monthly staff meetings. Training received by new users only, unless
determined by commanders that users should be reinstructed regarding protocols.

#3 Write-Up: The CIA Triad

Mnauel Randolph
9/15/2025
The CIA TRAID

The basis of security of information is the CIA Triad (Confidentiality, Integrity, and
Availability), which drives company practices. Authorization and identification are two separate
but related methods that regulate access to digital systems.
A framework for ensuring strong information security is the CIA Triad (Chai, 2022). Its three
guiding principles are:
Information is protected from unauthorized use by maintaining privacy. This often involves
access limits, encryption, and training staff members about social engineering and phishing
scams. Two-factor authentication for online banking, which ensures that only authorized users
may access sensitive data, is a typical example.
Integrity: Guarantees that data is reliable, precise, and consistent throughout its history. Among
the methods are version control, digital signatures, and checksums. Bitcoin and other version
control systems, for instance, guard against accidental or unlawful changes tainting important
source code.
Availability: Guarantees regular access to systems and data for authorized users. This covers
backup planning, backup systems, and failure techniques. A real example is cloud service
providers copying data across several geographic zones to reduce problems during outages.
These three ideas work together to give security procedures and regulations a well-rounded basis.
Organizations run the danger of data corruption, operational shutdowns, and breaches if they lack
any one of these.
Despite their frequent confusion, authorization and authentication have distinct security
functions:
The process of verifying a user’s identity is called authentication. Biometrics, tokens, and
usernames/passwords are examples of common techniques. Authentication is used, for example,
when you input your password to access an email account.
What an authenticated user is permitted to do is determined by authorization. It enforces
privileges and permissions, including whether a person that is logged in can read, edit, or remove

a document. An employee may be authenticated to access the portal in a company’s HR system,

for instance, but only permitted to view their own payroll information—not that of others.
The CIA Triad, which promotes availability, secrecy, and integrity as integral objectives,
continues to serve as the cornerstone of cybersecurity. In the meanwhile, authorization and
authentication are two crucial and separate processes in access control, despite their frequent
confusion. Organizations may lower the risk of data breaches, preserve the credibility of their
systems, and guarantee that sensitive resources are protected from constantly changing attacks by
successfully putting these ideas into practice.

Chai, W. (2022, June 28). What is the CIA Triad? Definition, Explanation, Examples.
TechTarget. Retrieved from
https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA
Stallings, W. (2019). Foundations of Security: What Every Programmer Needs to Know.
Addison-Wesley.

Leave a Reply

Your email address will not be published. Required fields are marked *