{"id":12,"date":"2023-09-11T17:37:54","date_gmt":"2023-09-11T17:37:54","guid":{"rendered":"https:\/\/wp.pprd.odu.edu\/spring2017-met330-template\/?page_id=12"},"modified":"2025-03-17T02:52:02","modified_gmt":"2025-03-17T02:52:02","slug":"hw","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aaronjones\/hw\/","title":{"rendered":"CYSE-200 Cybersecurity, Technology &amp; Society"},"content":{"rendered":"\n<p><br>This interdisciplinary course explores the relationship between technology and cybersecurity, examining its cultural, political, legal, ethical, and business impacts. I will analyze cybercrime opportunities, cultural influences on security strategies, and the ethical dilemmas in cybersecurity. The curriculum covers the global nature of cybersecurity, the costs and benefits of secure technologies, and their role in shaping behavior. By the end, I will have a well-rounded understanding of cybersecurity\u2019s complexities and its evolving challenges.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>Using the\u00a0<a href=\"https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">Chai Article\u00a0(Links to an external site.)<\/a>, along with additional research you will conduct on your own, describe the CIA Triad, and the differences between Authentication &amp; Authorization, including an example.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2025\/03\/The-CIA-Triad.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-CIA-Triad.\"><\/object><a id=\"wp-block-file--media-ac220edb-18cf-40b1-9bee-774c9e745bf8\" href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2025\/03\/The-CIA-Triad.pdf\">The-CIA-Triad<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2025\/03\/The-CIA-Triad.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ac220edb-18cf-40b1-9bee-774c9e745bf8\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>In this write-up you will use the\u00a0<a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">SCADA SystemsLinks to an external site.<\/a>\u00a0article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2025\/03\/SCADA-Systems1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SCADA-Systems1.\"><\/object><a id=\"wp-block-file--media-f583166c-3b48-46fe-9611-50983ea3b682\" href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2025\/03\/SCADA-Systems1.pdf\">SCADA-Systems1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2025\/03\/SCADA-Systems1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f583166c-3b48-46fe-9611-50983ea3b682\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This interdisciplinary course explores the relationship between technology and cybersecurity, examining its cultural, political, legal, ethical, and business impacts. I will analyze cybercrime opportunities, cultural influences on security strategies, and the ethical dilemmas in cybersecurity. The curriculum covers the global nature of cybersecurity, the costs and benefits of secure technologies, and their role in shaping &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/hw\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE-200 Cybersecurity, Technology &amp; Society<\/span><\/a><\/p>\n","protected":false},"author":25292,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/12"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/users\/25292"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":242,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/12\/revisions\/242"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}