Cybersecurity, Technology, and Society
Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:
- Describe how cyber technology creates opportunities for criminal behavior,
- Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
- Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
- Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
- Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
- Describe the costs and benefits of producing secure cyber technologies,
- Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
- Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
- Describe how cybersecurity produces ideas of progress and modernism.
E-Portfolio entry 1:
- Why are you interested in cybersecurity technology?
- Select four other majors offered by ODU and explain how those majors relate to cybersecurity. (A general search on ODU’s site or on Google)
It is plenty of reasons why I’m interested in cybersecurity technology. One reason is because I need to protect myself and others from cyberthreats and attacks. As this world’s technology advances, so do people’s mindsets. This new technology can lead to computers security systems being more vulnerable because the system is not used to the new technology that they got out. So that’s one of the main reasons I’m interested in cybersecurity technology. Four other majors that relate to cybersecurity that Old Dominion University offers is cybercrime, Information technology, criminal justice and computer science. Cybersecurity and cybercrime intersect with each other because cybercrime focuses more on the criminal acts of cybersecurity. Information Technology goes with cybersecurity because IT provides infrastructure to ensure security. Cybersecurity within It can also be listed as firewalls, encryption, security updates, and the intrusion detection system. Criminal justice corresponds with cybersecurity because of cybersecurity close relation to cybercrime which focuses on dealing with the criminal assets of cybersecurity. Criminal Justice focuses on laws and the court systems which may also include cyber laws online. For example, a state law code in Virginia that court system might use for criminal activities on the computer might be Virginia State Code 18.2-152.2 which is a code for most computer crimes. Computer science corresponds with cybersecurity because both focuses on the computer system, the networks, and valuable data that the computer has this brings to two different occupations together. Computer science also compasses the study of algorithms and programming. Algorithms is the step-by-step rules made for specific task. Algorithms play a key role in encryption and cryptographic protocols which is needed in securing sensitive information. Algorithms in computer science sorts of data and searches for information in different to complex task like encryption and machine learning, Things such as encryption and algorithms give cybersecurity and computer science a very special relationship with each other.
E-Portfolio entry 2:
- Describe four ethical issues that arise when storing electronic information about individuals.
- Compare cybersecurity risks in the U.S. and another country.
One of the many ethical issues that arise when storing electronic information about individuals is the privacy concerns. Storing electronic information on individuals causes privacy concerns because there is always a risk of a data breach or someone who has unauthorized access to that network or database. This also causes a problem because you may not know how well your electronic device can manage securing sensitive information which is a strong privacy concern. Another ethical issue when storing electronic information about individuals is Data and Security breaches. The security of your electronic information is very important. Safeguarding your information from hackers, unauthorized access and data breeches is a crucial matter and can have serious consequences if not following the protocol. Some of the consequences of failing to implement security measures include identity theft and financial fraud. Another ethical issues that arise is data accuracy. When storing the electronic information on individuals you need to make sure the data is accurate. You need to make sure the information is up to date and make sure the information given is correct. Failure to do so can cause denied access or opportunities. A huge ethical issue that arises when storing electronic information is an informed consent. It is very important to obtain the informed consent because failing to tell or inform the individuals about practices such as data storages can be looked at as a breach of trust. Cybersecurity risk in the US is very different than in other countries. Different country’s has different laws and rules when it comes down to cybersecurity. Other country’s also might have outdated or more advanced technology then the United States. Another factor is the country’s ability to respond and recover from a cyber incident, which may differ from the United States is a big one. The intensity of the threat may be based on geopolitical factors.
E-Portfolio entry 3:
How has cyber technology created opportunities for workplace deviance?
Cyber technology has created opportunity for the workplace deviance due to the rise of cyber technology, it has given individuals the opportunity to engage in cybercrime within an organization. Employees may also use the knowledge that they know about the cyber technology to gain unauthorized access to a system, database or top-secret information. Many different company’s gains access to the competitors’ systems for personal gain due to the use of their cyber technology and technical skills. Many different companies love to sabotage other company’s or competitors because it makes them look better and get more business than the other company. Others just are cruel people who enjoy watching others fail. Manipulating data is one of the ways that a company may sabotage different businesses. By manipulating data, they can get different information about the company and try to blackmail and harass that company. Cyber technology can be also used for Technology Facilitated harassment. It can be used to bully or discriminate a company through various emails and social media. Another tactic company employees use cyber technology is for Social Engineering Attacks. These employees can use their cybertechnology to manipulate the competition company employee’s sensitive information to also gain access to their system and information. Many insiders may use their knowledge of cybercriminals to tell their vulnerability’s and engage in fraudulent activity. An employee may also use their cyber technology to install harmful software to a competitor system causing the system to lose data. A big way people use cyber technology in the workforce is digital fraud which they use false invoices to manipulate financial records and steal funding. These are all ways that cyber technology is used in the workforce and ways that the different company’s use the technology to try to bring their company down. This gives plenty of opportunity for people in the workforce.
E-Portfolio entry 4:
- What are the costs and benefits of developing cybersecurity programs in business?
The cost and benefit of a developing cybersecurity program in business varies. Most businesses spend around 10% of their yearly IT budget on cybersecurity. So for example if your IT budget is 5 million, you will likely spend around $500,000. It is also a lot of factors that vary such as Initial investments, ongoing maintenance, training expenses, incident response cost and technological upgrades. Initial investments usually a requirement technology, training and software. Ongoing maintenance make sures the work system gets it updates regularly and keep maintaining going to make sure the system is working properly for cybersecurity measures. The training expenses is to make sure employees get the proper training that they are supposed to have. Th training expenses include materials, instructors and other external programs. Technological upgrades are a huge cost because technology needs to be up to par, in order to fight different cyber threats and vulnerabilities. Some of the benefits would include Risk mitigation, enhanced customer trust, regularly compliance, business continuity and cost saving. These are good benefits because sometimes a business lost can be very heavy and costly. If your cybersecurity system is good, you are least likely to have data breeches or other cyber-attacks. Another thing is that when the customer knows that your system is secure, they have more trust in you. This causing you and your customers to bond more and have enhanced customer trust. A cybersecurity program may also help improve the business continuity by not having as much as data breeches or cyber attacks that it would regularly have. A nice and secure environment also help the workers productivity because they can focus on their work without having to worry about disruptions they might have during a cyber-attack. This also expands the Supply chain cybersecurity for third parties, so that the chain supply cybersecurity measures improve.
E-Portfolio entry 5:
- How can you tell if your computer is safe?
- Describe three ways that computers have made the world safer and less safe.
You can tell that your computer is safe by having things such as antivirus programs. Antivirus programs prevent viruses and other cyberattacks from attacking your system. Another way is having a good firewall, with a good firewall it will monitor and control ongoing network traffic. Also, when your operating security system is up to date that is also another way you can tell that the system is safe because the updates usually have security patches within the update. Multi-Factor Authorization is also a good way because it makes your sensitive information very hard to get for cybercriminals and hackers. Ad blockers on a browser is also a nice alternative to let you know that your computer is safe. The ad blocker stops ads on certain websites from popping up. These pop ups sometimes contain malicious threats and cyber threats. Three ways that computer have made the world safer is that it has improved communication, Improved security systems and advanced medical facilities. Computers has enhanced communication allowing emergency response to quickly respond to an incident faster.
Computer has also improved surveillance system allowing less theft for the world. Another thing is that computer have did to improve the world is advance medical facilities. Computers has played a big part in medical research and diagnostic. Three ways that computer has made the world less safe is by privacy concerns, cyberthreats and the weaponization of technology. Cyber threats attack individuals and businesses personal privacy, infrastructure and their financial system. Privacy concern is also way computers make the world less safe. These privacy concerns include data collection and identity theft. Finally, computers make the world less safe by weaponizing technology. While computer technology advances so do the development of cyber weapons used for war. All of these are different ways that computer makes the world a less safe place.
E-Portfolio entry 6:
- How do engineers make cyber networks safer?
- What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?
There are many ways that engineers make cyber networks safer. One way is encrypting and data protection. Engineers use encryption technologies to protect and safeguard information. Engineers also create different test such as vulnerability and penetration test to find out the weakness of a network infrastructure. Engineers also puts security patches in the system to make sure that the security system is up to date. Engineers are also the ones that help outline the plans when the event of a cybersecurity incidents. Thy are the ones who strategizes containment, eradication and recovery. Engineers also give security awareness training by collaborating with human resources and the training department to educate employees about cybersecurity.
The overlap between criminal justice and cybercrime is that cybercrime deals with the criminal justice system. Unlike cybersecurity, cybercrime focuses more on the criminal act of crimes online in the cyber world. This directly connects cybercrime to criminal justice. Within criminal justice there are laws pertaining to cybercrimes. For example, the Virginia State code 18.2-152.2 it talks about most crimes that are done by computers and is used in court. Also different places and jurisdictions have different laws and rules so this makes people learning criminal justice very useful. Criminal justice focuses on the law and court system. Within my time at Old Dominion University, I have takin a criminal justice course and we went over a lot of stuff about cybercrime. When it comes down to it cybercriminals and regular criminals are the same and they both have interest, passion and reasons why they are doing the crime. Sometimes cybercriminals reason goes deeper then online. Sometimes it starts off online and when they find a suitable target, they do criminal acts in person. Cybersecurity corresponds with cybercrime and criminal justice because cybersecurity help people who occupation is cyber crime catch cybercriminals. When doing Cybercrime, they want you to learn cybersecurity and understand it because the same stuff applies to you. Criminal justice comes to play when the people doing cybercrime and cybersecurity catches the cybercriminal and they are in court for breaking the law.
E-Portfolio Entry 7:
- How does cyber technology impact interactions between offenders and victims?
- How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge?
Cyber technology impacts interaction between offenders and victims in many ways. One f the many ways that it does is by through cyber bullying and harassment. Cyber technology allows the user to bully and harass people online creating a lot of space for victimization. People also use digital technology to stalk people by the cyber technology monitoring and tracking the victim’s activity. Many offenders like to use cyber technology to do financial and online crimes. The victim will suffer an financial lost this being one of their interactions. Offenders may also use this technology to spread hate crimes. They may spread hate crimes by doing things such as giving hate speeches and engage on targeted attacks on groups and individuals. Offenders can also use deep fake technology to technology to change content, including different types of media such as video and audio. Offenders may use their cyber technology to exploit minors.
I also feel we need to adapt and embrace framework. We also need to have consideration of threat intelligence. This leverages real time information on current and emerging threats to decision making. We also need to practice implementing continuous risk assessment which help us practice to identify and prioritize evolving cyber risk. Another is cross sector coordination which help facilitate coordinate and communication of different sectors that are around the world. Information sharing is also important, it gives us the opportunity to work together and catch cybercriminals. It also enhances our ability to collect data on certain cases. Public awareness can also help promote cyber literacy. The more people that are aware and practice, the more secure your work area is. Capacity buildings is an consideration, this and training programs will help train cybersecurity professionals. A skilled workforce is very crucial within this type of field. These are How should we approach the development of cyber-policy and -infrastructure given the “short arm” of predictive knowledge.