Cybersecurity, Technology, and Society
Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains.
Course Material
Cyber technology allows easy access to information attainable digitally. It allows for malware attacks, phishing scams, identity theft and more cybercrimes. Some main cyber security threat concerns are confidentiality, integrity, and availability along with the infrastructure of a system or systems. Mechanisms put in place to protect against attacks have vulnerabilities that are often protected well. Cyber technology can have the effect of leading to people being victims of identity theft, cyber bullying, data theft and more.
This is a write up on the short arm term talking about how it goes in hand with cyber technology.
Given the term “short arm” in terms of knowledge being limited in the sense of time and not knowing the future technology. Ethics is a big part of developing cyber-policies to address any potential threats or concerns that may affect the privacy of one’s secure information. Having a cyber-policy in place as a guideline of what to follow to protect all users should be firm but flexible as new threats can always arise with new knowledge. Making sure all employees are aware of policies put in place and are able to respect the policies and adhere to them. With not knowing future attacks there could be ethical hackers who attempt to access your systems for practicing databases security systems. Making sure the infrastructure system is strong enough to protect data, system availability, the integrity of the information, and confidentiality is very important. Regularly monitoring common threats in the world can help you be more up to date on how to go about protecting all data. Regular back ups should happen, firewalls in place to secure the whatever systems you’re accessing, and actively training employees on privacy measures.
If I was a chief information security officer on a budget and had to balance the tradeoff of training and additional cyber security technology I would make sure I knew what my team needed. Making sure I know what my team can handle with mitigating attacks coming in and blocking active attacks will help me know what training is needed. I would say there should be a 60/40 split between training and additional cyber security technology with training getting more of the budget. With the right training you can make sure your team has the knowledge to protect passwords and have multi-factor authentication, and knows how to protect themselves against hacks. Even with training there should be money and time spent on additional technology to help defend against outside threats and malware attacks.