{"id":133,"date":"2025-09-24T18:57:07","date_gmt":"2025-09-24T18:57:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-12-01T20:47:35","modified_gmt":"2025-12-01T20:47:35","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/alexandergarritt\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n<h1>Course Material<\/h1>\n\n\n<p>Two write ups, a discussion board post, and the final reflective paper have been included as examples of course material completed. <\/p>\n\n\n\n<p>The first artifact is a write-up on exploring the CIA triad. It relates in part to learning outcome 3 described above, as it demonstrates the competing needs to provide services through technology while remaining cybersecure. This is illustrated below through the various risk factors and their corresponding mitigation techniques. This write-up was an interesting challenge as it was the first one I had ever completed for any class. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"681\" height=\"889\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-Triad-Page-1.png\" alt=\"\" class=\"wp-image-293\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-Triad-Page-1.png 681w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-Triad-Page-1-230x300.png 230w\" sizes=\"(max-width: 681px) 100vw, 681px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"673\" height=\"514\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-traid-page-2.png\" alt=\"\" class=\"wp-image-294\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-traid-page-2.png 673w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-traid-page-2-300x229.png 300w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-traid-page-2-393x300.png 393w\" sizes=\"(max-width: 673px) 100vw, 673px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"667\" height=\"358\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-triad-page-3.png\" alt=\"\" class=\"wp-image-297\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-triad-page-3.png 667w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-triad-page-3-300x161.png 300w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/CIA-triad-page-3-559x300.png 559w\" sizes=\"(max-width: 667px) 100vw, 667px\" \/><\/figure>\n\n\n\n<p>The second artifact is a short write up on SCADA systems. This relates to learning outcome 1 in that it showcases that while technology is advancing and becoming more cybersecure, it still can introduce new vulnerabilities or boost the old. This write up was far easier than the previous one, as I felt far more confident in using business writing skills by this point. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"675\" height=\"867\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/SCADA-write-up-1.png\" alt=\"\" class=\"wp-image-295\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/SCADA-write-up-1.png 675w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/SCADA-write-up-1-234x300.png 234w\" sizes=\"(max-width: 675px) 100vw, 675px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"667\" height=\"316\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/SCADA-write-up-2.png\" alt=\"\" class=\"wp-image-296\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/SCADA-write-up-2.png 667w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/SCADA-write-up-2-300x142.png 300w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/11\/SCADA-write-up-2-600x284.png 600w\" sizes=\"(max-width: 667px) 100vw, 667px\" \/><\/figure>\n\n\n\n<p>The third artifact is from a discussion board on Verbeek&#8217;s writing, <em>Designing the Public Sphere: Information Technologies and the Politics of Mediation<\/em>. This post most closely relates to learning outcome 2, as I discuss how I believe culture would react to emerging cybertechnologies if they continue to go unregulated. This discussion board was incredibly thought provoking as Verbeek&#8217;s writing indicates such broad ethical considerations. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/Cyber-discussion-post-1024x461.png\" alt=\"\" class=\"wp-image-300\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/Cyber-discussion-post-1024x461.png 1024w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/Cyber-discussion-post-300x135.png 300w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/Cyber-discussion-post-768x346.png 768w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/Cyber-discussion-post-600x270.png 600w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/Cyber-discussion-post.png 1498w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The final artifact is a reflection paper wherein three topics from the course were picked and discussed. This relates to learning outcome 1 as it shows how human nature inevitably conflicts with emerging technology to create cybercrime. This paper was a challenge as I tried to keep the themes interconnected while having such visible separation through the required business writing skills and structure. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"652\" height=\"816\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-1.png\" alt=\"\" class=\"wp-image-301\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-1.png 652w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-1-240x300.png 240w\" sizes=\"(max-width: 652px) 100vw, 652px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"631\" height=\"822\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-2.png\" alt=\"\" class=\"wp-image-302\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-2.png 631w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-2-230x300.png 230w\" sizes=\"(max-width: 631px) 100vw, 631px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"796\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-3.png\" alt=\"\" class=\"wp-image-303\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-3.png 625w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-3-236x300.png 236w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"604\" height=\"811\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-4.png\" alt=\"\" class=\"wp-image-304\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-4.png 604w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-4-223x300.png 223w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"622\" height=\"753\" src=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-5.png\" alt=\"\" class=\"wp-image-305\" srcset=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-5.png 622w, https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-content\/uploads\/sites\/39909\/2025\/12\/cyber-paper-5-248x300.png 248w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how cyber technology creates opportunities for criminal&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/alexandergarritt\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":31563,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-json\/wp\/v2\/users\/31563"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-json\/wp\/v2\/pages\/133\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alexandergarritt\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}