{"id":133,"date":"2025-02-02T20:25:08","date_gmt":"2025-02-02T20:25:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-04-28T02:32:17","modified_gmt":"2025-04-28T02:32:17","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyber1\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n<h1>Course Material<\/h1>\n<p>Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,\u00a0 and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.<\/p>\n<p class=\"p1\">Be sure to remove this instructional language when you have completed updating content on this page.<\/p>\n\n\n<p>William Albert<br>CYSE200T<br>2025\/03\/27<br>SCADA SYSTEMS<br>BLUF: This paper talks about what the SCADA systems are about and what they are<br>used for.<br>Critical infrastructure systems\u2014such as power grids, water treatment plants,<br>transportation systems, and industrial plants\u2014are increasingly at risk of both cyber and<br>physical attacks. These threats are the result of outdated technology, poor cybersecurity<br>practices, and the increasing interconnectivity of operational technology (OT) and<br>information technology (IT). The threats can be dangerous, because from cyberattacks<br>and insider threats to natural disasters and equipment failures, each of them has the<br>potential to compromise critical services and pose economic or safety threats.<br>Supervisory Control and Data Acquisition (SCADA) systems play a vital role in such<br>threat mitigation, enabling real-time monitoring, automation, and control of industrial<br>processes. These applications help in detecting anomalies, resource allocation<br>optimization, and quick response to developing threats. They also incorporate<br>cybersecurity features, including encryption, authentication, and intrusion detection, for<br>protecting the critical infrastructure against cyber threats. Also, SCADA systems of<br>today use artificial intelligence (AI) and machine learning (ML) to facilitate predictive<br>maintenance, which minimizes the likelihood of sudden breakdowns.<br>But SCADA systems can be used as a target for cyberattacks if they are not properly<br>secured. To improve resilience to both cyber and physical attacks, organizations need<br>to implement best practices, including network segmentation, timely updates, and<br>thorough employee training. Securing SCADA systems is critical for safeguarding<br>national infrastructure and maintaining the uninterrupted delivery of services.<\/p>\n\n\n\n<p>William Albert<br>CYSE200T<br>2025\/03\/27<br>The Human Factor in Cybersecurity<br>BLUF: This paper talks about what a CISO consists of and what are they prioritize for<br>any companies,<br>A CISO with a limited budget, 50% would be allocated to training the employees and<br>50% to cybersecurity technology. Since human error is most often the biggest<br>weakness in cybersecurity, training must be given high priority. Since the majority of<br>people are already being attacked online through phishing, most of the budget for<br>training would be used to train them in phishing awareness. Employee training for how<br>to recognize phishing emails and avoid being social engineering victims can greatly<br>reduce the likelihood of breaches. Security best practices would also be stressed by<br>way of training, such as good passwords, activating multi-factor authentication, and safe<br>file-sharing practices.<br>The remaining 50% would be used to purchase necessary cybersecurity tools that<br>would offer maximum protection to the organization. These would include firewalls,<br>endpoint security software, and intrusion detection\/prevention systems that offer<br>protection against common threats and attacks. The spending on monitoring tools to<br>track network traffic, detect anomalies, and keep software updated is crucial in<br>minimizing vulnerabilities.<br>In conclusion, being a CISO is one of the most responsible jobs you would have in the<br>cybersecurity field and you would need to acquire a lot of skills to be one.<\/p>\n\n\n\n<p><strong>Discussion Board &#8211; The &#8220;Short Arm&#8221; of Predictive Knowledge<\/strong><\/p>\n\n\n\n<p>Given the &#8220;short arm&#8221; of predictive information, we should behave with prudence, responsibility, and ethical foresight in both cyber-infrastructure and policy. Since we cannot predict future outcomes, policies should give human values, flexibility, and safety top priority, thereby leaving technology for public benefit and avoiding collateral damage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Discussion Topic: Opportunities for Workplace DevianceOpportunities for Workplace Deviance<\/h2>\n\n\n\n<p>How has cyber technology created opportunities for workplace deviance?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reply from WILLIAM ALBERT<\/h3>\n\n\n\n<p>Cyber technology has presented channels for deviance in the workplace since it makes it easy to remain anonymous, and this makes employees confident enough to engage in inappropriate activities without worrying about immediate consequences. Cyber technology has encouraged access to company secrets, which can lead to inappropriate usage such as stealing data or insider trading.&nbsp;Teleworking makes workers hard to control, and this allows deviant behavior such as slacking off or faking working hours. Use of social media can lead to disclosure of confidential data or disparaging remarks by the employees. Additionally, cybersecurity breaches, like circumventing security measures, and e-distractions can harm productivity and ethical standards.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how cyber technology creates opportunities for criminal&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber1\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30412,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber1\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber1\/wp-json\/wp\/v2\/users\/30412"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber1\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/cyber1\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":316,"href":"https:\/\/sites.wp.odu.edu\/cyber1\/wp-json\/wp\/v2\/pages\/133\/revisions\/316"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber1\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}