IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

Discussion Board: The NIST Cybersecurity Framework

After reading the information about the NIST Cybersecurity Framework, organizations can gain several benefits from using it. One of the benefits included is that it has multiple tiers of security that a company or business can use depending on what they need because this framework can be used on top of the framework they are currently using. The tiers can go from partial being the lowest security to adaptive being the highest. Another benefit is the framework core has specific activities it needs to achieve to have the desired outcomes. These activities are to identify, protect, detect, respond, and recover in that order after a cyber-attack or vulnerability has been found. It is not a checklist but rather a guide in managing the risk that happens. How I will use this framework at my future workplace is that I will follow this framework to help manage the risk if there happens to be any.

I also have three blog posts regarding course material.