CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,  and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.

Be sure to remove this instructional language when you have completed updating content on this page.


Discussion Board: The NIST Cybersecurity Framework

The benefit organizations will gain from using the NIST Cybersecurity Framework is that its core sets a clear structure that includes five concurrent and continuous functions. The functions of the framework are to identify, protect, detect, respond, and recover. Each of these functions has its own role that can be separated into its own category that makes up an organization’s management of cybersecurity risk.  I would use these benefits to continuously improve my future workplace. Therefore the organization becomes aware of new risks that may come upon and will adapt to them quickly to protect the organization, this will be a standard practice in order to be safe from any risk.

DISCUSSION BOARD: Protecting Availability

As a CISO for a publicly traded company, I would implement data backup and replications to ensure availability to our systems. Regular backups ensure data is safe to be recovered. This is helpful especially when it comes to unexpected system failures or security breaches from an unauthorized user. Data backup and replications in systems, will call for faster restoration of services. This implementation is going to ensure that data will always remain unharmed and available for the company whether it’s a local or remote location.

Hacking Humans Writeup

My takeaway from the article “Hacking Humans: Protecting Our DNA From Cybercriminals” by Juliette Rizkallahis is the increase in the trend of direct-to-consumer DNA testing. The thought of having DNA digitalizing and being sent to organizations can leave employers very vulnerable. This is because when the organization somehow gets breached, hackers have the opportunity to steal the DNA on the organization’s database. Sensitive information like social security, credit card, and bank numbers can all be stolen, but it doesn’t hold the same potential risk as DNA. Although our DNA is to help organizations help identify their employers it is also unchangeable and irreplaceable. Due to those risks, the article discusses how DNA can be stolen and when it gets the the wrong hands, someone’s identification can be used and the following potential risks of digitizing personal DNA data on the dark web. As the most sensitive type of personally identifiable information (PII), DNA is extremely dangerous to have stolen or compromised. The article emphasizes the necessity of stronger security procedures in storing and safeguarding DNA data, and how the developing area of “cyberbiosecurity” attempts to address these issues. To prevent the serious implications of identity theft linked to DNA, consumers need to maintain their awareness.