{"id":282,"date":"2025-09-22T00:24:10","date_gmt":"2025-09-22T00:24:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/?p=282"},"modified":"2025-12-03T22:34:44","modified_gmt":"2025-12-03T22:34:44","slug":"about-me","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/2025\/09\/22\/about-me\/","title":{"rendered":"Course Assignments"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">#1 Discussion Topic: The \u201cShort Arm\u201d of Predictive Knowledge The&nbsp;\u201cShort Arm\u201d of Predictive Knowledge The&nbsp;\u201cShort Arm\u201d of Predictive Knowledge<\/h2>\n\n\n\n<p>Humans used to simply need to be prepared for quick, local impacts, as shown by Jonas\u2019s \u201cshort arm\u201d of prophetic knowledge. AI, social media, and global connections are examples of contemporary innovations that break this pattern and have long-term, worldwide effects. Infrastructure and cyber-policy must change correspondingly; transdisciplinary planning, proactive, cautious leadership, and moral system design are important. Adaptive policies and scenario modeling aid in controlling risk and averting damage. Moving from short- to long-term responsibility ensures technology serves society safely and ethically, mirroring Jonas\u2019s appeal to widen our prediction horizon in a linked world.<\/p>\n\n\n\n<p><strong>#2 Business Writing Skills \u2013 In-Class Graded Exercise<\/strong><\/p>\n\n\n\n<p>Instruction on the utilization of applications provided by educators at Eleganz. Instruction gotten<br>by Eleganz workers in a mock center and a classroom. Application Functionality is included by<br>educators into the mock command scenarios in an effort to simulate real world crises.<br>Meaningful feedback on teachings is maintained by instructors in Ms Excel spreadsheet.<br>Recommendations for improvement are prioritized by assistant directors. Feedback on teachings<br>is gotten by instructed monthly staff meetings. Training received by new users only, unless<br>determined by commanders that users should be reinstructed regarding protocols.<\/p>\n\n\n\n<p><strong>#3 Write-Up: The CIA Triad<\/strong><\/p>\n\n\n\n<p>Mnauel Randolph<br>9\/15\/2025<br>The CIA TRAID<\/p>\n\n\n\n<p>The basis of security of information is the CIA Triad (Confidentiality, Integrity, and<br>Availability), which drives company practices. Authorization and identification are two separate<br>but related methods that regulate access to digital systems.<br>A framework for ensuring strong information security is the CIA Triad (Chai, 2022). Its three<br>guiding principles are:<br>Information is protected from unauthorized use by maintaining privacy. This often involves<br>access limits, encryption, and training staff members about social engineering and phishing<br>scams. Two-factor authentication for online banking, which ensures that only authorized users<br>may access sensitive data, is a typical example.<br>Integrity: Guarantees that data is reliable, precise, and consistent throughout its history. Among<br>the methods are version control, digital signatures, and checksums. Bitcoin and other version<br>control systems, for instance, guard against accidental or unlawful changes tainting important<br>source code.<br>Availability: Guarantees regular access to systems and data for authorized users. This covers<br>backup planning, backup systems, and failure techniques. A real example is cloud service<br>providers copying data across several geographic zones to reduce problems during outages.<br>These three ideas work together to give security procedures and regulations a well-rounded basis.<br>Organizations run the danger of data corruption, operational shutdowns, and breaches if they lack<br>any one of these.<br>Despite their frequent confusion, authorization and authentication have distinct security<br>functions:<br>The process of verifying a user\u2019s identity is called authentication. Biometrics, tokens, and<br>usernames\/passwords are examples of common techniques. Authentication is used, for example,<br>when you input your password to access an email account.<br>What an authenticated user is permitted to do is determined by authorization. It enforces<br>privileges and permissions, including whether a person that is logged in can read, edit, or remove<\/p>\n\n\n\n<p>a document. An employee may be authenticated to access the portal in a company\u2019s HR system,<\/p>\n\n\n\n<p>for instance, but only permitted to view their own payroll information\u2014not that of others.<br>The CIA Triad, which promotes availability, secrecy, and integrity as integral objectives,<br>continues to serve as the cornerstone of cybersecurity. In the meanwhile, authorization and<br>authentication are two crucial and separate processes in access control, despite their frequent<br>confusion. Organizations may lower the risk of data breaches, preserve the credibility of their<br>systems, and guarantee that sensitive resources are protected from constantly changing attacks by<br>successfully putting these ideas into practice.<\/p>\n\n\n\n<p>Chai, W. (2022, June 28).&nbsp;What is the CIA Triad? Definition, Explanation, Examples.<br>TechTarget. Retrieved from<br>https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<br>Stallings, W. (2019).&nbsp;Foundations of Security: What Every Programmer Needs to Know.<br>Addison-Wesley.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>#1 Discussion Topic: The \u201cShort Arm\u201d of Predictive Knowledge The&nbsp;\u201cShort Arm\u201d of Predictive Knowledge The&nbsp;\u201cShort Arm\u201d of Predictive Knowledge Humans used to simply need to be prepared for quick, local impacts, as shown by Jonas\u2019s \u201cshort arm\u201d of prophetic knowledge. AI, social media, and global connections are examples of contemporary innovations that break this pattern&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/2025\/09\/22\/about-me\/\">Read More<\/a><\/div>\n","protected":false},"author":31502,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/posts\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/users\/31502"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":311,"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/posts\/282\/revisions\/311"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/manuel-d-randolph\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}