IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,  and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.

Be sure to remove this instructional language when you have completed updating content on this page.

William Albert
CYSE200T
2025/03/27
SCADA SYSTEMS
BLUF: This paper talks about what the SCADA systems are about and what they are
used for.
Critical infrastructure systems—such as power grids, water treatment plants,
transportation systems, and industrial plants—are increasingly at risk of both cyber and
physical attacks. These threats are the result of outdated technology, poor cybersecurity
practices, and the increasing interconnectivity of operational technology (OT) and
information technology (IT). The threats can be dangerous, because from cyberattacks
and insider threats to natural disasters and equipment failures, each of them has the
potential to compromise critical services and pose economic or safety threats.
Supervisory Control and Data Acquisition (SCADA) systems play a vital role in such
threat mitigation, enabling real-time monitoring, automation, and control of industrial
processes. These applications help in detecting anomalies, resource allocation
optimization, and quick response to developing threats. They also incorporate
cybersecurity features, including encryption, authentication, and intrusion detection, for
protecting the critical infrastructure against cyber threats. Also, SCADA systems of
today use artificial intelligence (AI) and machine learning (ML) to facilitate predictive
maintenance, which minimizes the likelihood of sudden breakdowns.
But SCADA systems can be used as a target for cyberattacks if they are not properly
secured. To improve resilience to both cyber and physical attacks, organizations need
to implement best practices, including network segmentation, timely updates, and
thorough employee training. Securing SCADA systems is critical for safeguarding
national infrastructure and maintaining the uninterrupted delivery of services.

William Albert
CYSE200T
2025/03/27
The Human Factor in Cybersecurity
BLUF: This paper talks about what a CISO consists of and what are they prioritize for
any companies,
A CISO with a limited budget, 50% would be allocated to training the employees and
50% to cybersecurity technology. Since human error is most often the biggest
weakness in cybersecurity, training must be given high priority. Since the majority of
people are already being attacked online through phishing, most of the budget for
training would be used to train them in phishing awareness. Employee training for how
to recognize phishing emails and avoid being social engineering victims can greatly
reduce the likelihood of breaches. Security best practices would also be stressed by
way of training, such as good passwords, activating multi-factor authentication, and safe
file-sharing practices.
The remaining 50% would be used to purchase necessary cybersecurity tools that
would offer maximum protection to the organization. These would include firewalls,
endpoint security software, and intrusion detection/prevention systems that offer
protection against common threats and attacks. The spending on monitoring tools to
track network traffic, detect anomalies, and keep software updated is crucial in
minimizing vulnerabilities.
In conclusion, being a CISO is one of the most responsible jobs you would have in the
cybersecurity field and you would need to acquire a lot of skills to be one.

Discussion Board – The “Short Arm” of Predictive Knowledge

Given the “short arm” of predictive information, we should behave with prudence, responsibility, and ethical foresight in both cyber-infrastructure and policy. Since we cannot predict future outcomes, policies should give human values, flexibility, and safety top priority, thereby leaving technology for public benefit and avoiding collateral damage.


Discussion Topic: Opportunities for Workplace DevianceOpportunities for Workplace Deviance

How has cyber technology created opportunities for workplace deviance?

Reply from WILLIAM ALBERT

Cyber technology has presented channels for deviance in the workplace since it makes it easy to remain anonymous, and this makes employees confident enough to engage in inappropriate activities without worrying about immediate consequences. Cyber technology has encouraged access to company secrets, which can lead to inappropriate usage such as stealing data or insider trading. Teleworking makes workers hard to control, and this allows deviant behavior such as slacking off or faking working hours. Use of social media can lead to disclosure of confidential data or disparaging remarks by the employees. Additionally, cybersecurity breaches, like circumventing security measures, and e-distractions can harm productivity and ethical standards.