Cybersecurity, Technology, and Society
Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:
- Describe how cyber technology creates opportunities for criminal behavior,
- Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
- Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
- Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
- Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
- Describe the costs and benefits of producing secure cyber technologies,
- Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
- Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
- Describe how cybersecurity produces ideas of progress and modernism.
Assignments Over The Course
SCADA Systems Write-Up
The Human Factor Write-Up
NIST Discussion Board Post
The Article Improving Cybersecurity showcase how Framework can drastically benefit a organization. As Framework consist of 3 main components. First there is the Framework Core, which comprises of five functions: Identify, Protect, Detect, Respond, and Recover. This can aid a organization in managing its cybersecurity risk. By organizing data, addressing treats, risk base decisions and improving throughout. Then there is the Framework Implementation Tiers, ranging from Tier 1 to Tier 4. Which describes the increasing degree of cybersecurity risk management practices that is informed by business needs. Next is Framework Profile, this can be used to describe the current state or the target state of cybersecurity securities. Essentially Framework provides the means of requirements of cybersecurity for businesses and customers. Also to help identify openings in an organizations’ cybersecurity practices. Now if I ever own a organization, I will implement Framework at its fullest potential. I will make sure Framework is updated as systems advances and create a target profile. However, most likely will use the Framework Core and Profile. Also it’s very important that practices are used daily as its better to be prepared than be sorry.
https://drive.google.com/file/d/1wPp9kofp-gdlu3NAisszeM8d8ko1djF1/view