{"id":133,"date":"2023-02-03T19:28:15","date_gmt":"2023-02-03T19:28:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2023-04-16T18:00:05","modified_gmt":"2023-04-16T18:00:05","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/carterallgeier\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity, Technology, and Society<\/h1>\n\n\n\n<p>Students in&nbsp;IT\/CYSE 200T&nbsp;will explore how technology is related to cybersecurity from an interdisciplinary orientation.&nbsp; Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n\n\n\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n\n\n\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n\n\n\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n\n\n\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n\n\n\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n\n\n\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n\n\n\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n\n\n\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n\n\n\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Human Factor &#8211; Training vs Technology<\/h2>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p>In the ever-growing world of technology and cybersecurity there are always going to be risks and threats you can\u2019t avoid, even if a company tries to, it&#8217;s not cost-effective.&nbsp; With how companies and their&#8230;. <\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/sites.wp.odu.edu\/carterallgeier\/it-cyse-200t-2\/the-human-factor-training-vs-technology\/\">Continue reading here&#8230;.<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-layout-2 wp-block-buttons-is-layout-flex\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">A few discussion post from this a class&#8230;<\/h2>\n\n\n\n<p class=\"has-text-align-center has-white-background-color has-text-color has-background\" style=\"color:#404040\"><em><strong>How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge?<\/strong><\/em><\/p>\n\n\n\n<p>In the world of cyber-security it is very hard to predict future or potential risks around newer technology. That is why companies must approach they cyber-policy and infrastructure in a way that keeps in mind they cannot get rid of all risks and vulnerabilities within their companies. Trying to predict the future when it comes to risks, is like trying to solve a problem that is not it there, its costly and could potentially be of no value, so little to no cybersecurity budget should be used in the development of these protections, that should be part of research and developments budget. Companies must create a plan to identify and prioritize these risks. The NIST Framework is perfect for itemizing cybersecurity risks and threats and allows companies to prioritize where to allocate funds for the most dangerous risks and to work from there. This is also very relatable to cheating in video games, its hard to predict how people will bypass anti-cheat or break the game.<\/p>\n\n\n\n<p class=\"has-text-align-center has-text-color\" style=\"color:#404040\"><em><strong>From your readings of pages 1 &#8211; 21 of the NIST Cybersecurity Framework, what benefit can organizations gain from using this framework, and how would you use it at your future workplace?<\/strong><\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>I think the most beneficial aspect of the NIST Framework is how it gives companies a straightforward plan for the security they want and need, through the Target and Current Profiles. Once the company chooses a target profile and the current profile is evaluated they are left with the gap analysis, which is essentially a to-do list for the company. This gives the company a goal and an idea of what they need to do. I would use this Framework to the fullest. One thing I really liked in this document is the communication aspect and having guidelines with the Target Profile for smoother and quicker communication within the company and with its stakeholders. An example from the framework shows this, If another company is doing business with another, and there are potential risks, company 1 could use its current profile to show their requirement and cybersecurity needs. Another system I would implement would be the Tiers system, for the simplicity of understanding the vulnerabilities and evaluating current responses to threats.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in&nbsp;IT\/CYSE 200T&nbsp;will explore how technology is related to cybersecurity from an interdisciplinary orientation.&nbsp; Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Course Material The Human Factor &#8211; Training vs &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/carterallgeier\/it-cyse-200t-2\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">IT\/CYSE 200T<\/span><\/a><\/p>\n","protected":false},"author":26158,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/carterallgeier\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/carterallgeier\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/carterallgeier\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterallgeier\/wp-json\/wp\/v2\/users\/26158"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterallgeier\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/carterallgeier\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":313,"href":"https:\/\/sites.wp.odu.edu\/carterallgeier\/wp-json\/wp\/v2\/pages\/133\/revisions\/313"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/carterallgeier\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}