{"id":133,"date":"2024-09-23T03:15:56","date_gmt":"2024-09-23T03:15:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-11-30T17:58:01","modified_gmt":"2024-11-30T17:58:01","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/david-knoepp\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n<h1>Course Material<\/h1>\n<p>Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,\u00a0 and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.<\/p>\n\n\n<h2 class=\"wp-block-heading\">These are some assignments completed in this course<\/h2>\n\n\n\n<p><strong>Assignment 1.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p>Bring Your Own Application (BYOA) Policy<\/p>\n\n\n\n<p><br>Purpose:<br>This Bring Your Own Application (BYOA) Policy aims to safeguard TechSolutions Inc.&#8217;s<br>information security by regulating the use of employee-installed applications on corporate<br>devices or within the corporate network. As employees bring third-party applications into<br>the workspace to increase productivity, these applications can present significant security<br>risks if not managed properly. This policy ensures the secure use of such applications<br>while maintaining business efficiency.<\/p>\n\n\n\n<p><br>Scope:<br>This policy applies to all employees, contractors, and temporary workers at TechSolutions<br>Inc. who access company networks, data, or systems, using personal or corporate<br>devices.<\/p>\n\n\n\n<p><br>Policy:<br>1. Application Approval Process:<br>\u2022 All third-party applications must be reviewed and approved by the IT<br>department before they can be installed or used within TechSolutions Inc.\u2019s<br>network.<br>\u2022 Employees must submit a request for application use through the corporate<br>service desk, detailing the purpose and functionality of the application.<br>\u2022 Unapproved or unsanctioned applications are strictly prohibited from being<br>installed on company devices or used to access company data.<\/p>\n\n\n\n<p><br>2. Security Evaluation:<br>\u2022 The IT security team will conduct a risk assessment of any new applications<br>requested to ensure they do not pose significant vulnerabilities or data<br>security threats.<br>\u2022 Applications must comply with company security standards, including<br>encryption, data privacy, and network access controls.<\/p>\n\n\n\n<p><br>3. Data Handling &amp; Compliance:<br>\u2022 Applications that store, process, or transmit company data must ensure<br>compliance with data protection regulations (e.g., GDPR, CCPA).<\/p>\n<\/div><\/div>\n\n\n\n<p>\u2022 Applications must provide the capability to restrict and audit data sharing<br>between employees and external parties.<\/p>\n\n\n\n<p><br>4. Application Updates:<br>\u2022 Approved applications must be regularly updated to the latest version to<br>prevent security vulnerabilities.<br>\u2022 Employees will be responsible for ensuring applications are patched in line<br>with the company&#8217;s security update schedule.<\/p>\n\n\n\n<p><br>5. Revocation of Access:<br>\u2022 The IT department reserves the right to revoke access to or disable any third-<br>party application that poses a security risk or no longer meets the company\u2019s<br>security requirements.<br>\u2022 Failure to adhere to this policy will result in the immediate removal of the<br>offending application and may result in disciplinary action.<\/p>\n\n\n\n<p><br>6. Incident Reporting:<br>\u2022 If an employee suspects that a third-party application has led to a data<br>breach or security incident, they must immediately report it to the Incident<br>Response Team.<br>\u2022 The IT department will initiate an investigation and take appropriate steps to<br>contain and mitigate any risks.<\/p>\n\n\n\n<p><br>Enforcement:<br>Violations of this policy will be subject to disciplinary actions, up to and including<br>termination of employment. TechSolutions Inc. reserves the right to monitor, audit, and<br>remove any applications that conflict with organizational security policies.<\/p>\n\n\n\n<p><br>Effective Date:<br>This policy is effective as of 09\/26\/2024 and is subject to periodic review.<\/p>\n\n\n\n<p><br>Policy Owner:<br>Chief Information Security Officer (CISO)<br>TechSolutions Inc.<\/p>\n\n\n\n<p><strong>Assignment 2.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">SCADA systems write-up<\/p>\n\n\n\n<p class=\"has-text-align-center\">SCADA systems, which stands for Supervisory Control and Data Acquisition, are super<br>important for running things like water treatment plants, gas pipelines, and power grids.<br>Basically, these systems allow operators to monitor and control all the different parts that<br>make up essential infrastructure, which keeps things working smoothly in our everyday<br>lives. But with all the benefits come some real risks. As SCADA systems have become<br>more connected to networks, they\u2019ve become more vulnerable to cyberattacks. If a hacker<br>gained access to a SCADA system, they could mess with crucial services, like electricity or<br>water, which could cause serious problems for a lot of people.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>A lot of these security issues come from the fact that many SCADA systems were designed<br>a while ago, before cybersecurity was as big of a priority as it is now. Some of these older<br>systems use outdated, proprietary communication protocols that don\u2019t have strong<br>security, which makes them easier targets for hackers. There\u2019s also a common<br>misconception that SCADA systems are safe just because they\u2019re separate from the<br>internet. But the reality is, there are plenty of ways that attackers could still gain access,<br>especially through local network connections or weak points in the system.<br>Despite these risks, SCADA systems actually play a huge role in reducing threats by<br>allowing operators to keep an eye on everything in one central place. These systems gather<br>data from all over from sensors and other monitoring devices called Remote Terminal<br>Units (RTUs) and Programmable Logic Controllers (PLCs) and store it in databases that<br>operators can check on through what\u2019s called the Human-Machine Interface (HMI).<br>Through the HMI, operators can view real-time information about the system\u2019s status and<br>receive alerts if anything goes wrong. For instance, if a pump isn\u2019t working right, the SCADA<br>system will notify the operator so they can fix it quickly. This setup helps operators catch<br>problems early before they get out of control.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>To make sure SCADA systems are protected, many include backup components, so the<br>system can keep running even if one part fails. For example, if a main server goes offline, a<br>backup can automatically take over, allowing operators to keep monitoring important<br>processes without any downtime. Modern SCADA systems also use communication<br>protocols like IEC 61850 and DNP3, which are standardized to improve security and make<br>it easier for SCADA systems to work with other equipment. By moving away from older,<br>proprietary protocols to these standardized ones, SCADA systems are generally more<br>secure and compatible.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><br>Even with these protections, there are still some challenges. Older protocols like Modbus<br>RTU don\u2019t come with built-in security features, so operators have to be extra careful with<br>things like passwords and network configurations. Because SCADA systems today are<br>more connected through wide-area networks (WAN) and use protocols like TCP\/IP, it\u2019s easier for attackers to find weak points if the system isn\u2019t carefully secured. This is why<br>using firewalls and VPNs is really important. Insider threats are also a risk since anyone<br>with access to SCADA controls could accidentally or intentionally cause disruptions.<br>In the end, SCADA systems are incredibly important for keeping critical infrastructure safe<br>and functional. They give operators the ability to control things remotely, monitor<br>processes in real-time, and get alerts when something isn\u2019t right. Even though there are<br>vulnerabilities, SCADA systems can be highly secure if they\u2019re kept up-to-date and<br>properly managed. As cyber threats continue to evolve, it\u2019s essential that SCADA systems<br>are protected to avoid any disruptions to the critical services we all rely on.<\/p>\n\n\n\n<p><strong>Assignment 3.<\/strong><\/p>\n\n\n\n<p>The human factor in cybersecurity write-up<\/p>\n\n\n\n<p>If I were the Chief Information Security Officer (CISO) and had to work with a limited budget to protect the company from cyber threats, I\u2019d need to find a smart balance between training employees and investing in cybersecurity technology. First, I\u2019d spend around 40% of the budget on training and awareness programs. This is because human error is one of the biggest reasons for data breaches, like when people fall for phishing scams or don\u2019t follow security rules. If employees are trained to spot threats and know how to react, it could prevent a lot of problems before they even start. Plus, ongoing training would help build a culture where everyone is more careful and aware of security risks.<\/p>\n\n\n\n<p>Next, I\u2019d allocate about 50% of the budget to upgrading and maintaining strong cybersecurity technology. This would include things like firewalls, endpoint security software, and tools that use AI to help detect and respond to threats faster. Advanced tech can block attacks that employees might not notice, like malware or zero-day vulnerabilities. It\u2019s important to have tools that can protect the company on all fronts, especially if there are gaps in human oversight.<\/p>\n\n\n\n<p>Finally, I\u2019d use the last 10% for incident response and monitoring. This would help make sure that if a breach does happen, the company can act quickly to reduce the damage. Having a plan for responding to incidents and possibly using managed security services would be a smart way to extend our response capabilities without needing to hire a lot of extra staff.<\/p>\n\n\n\n<p>Overall, balancing these areas is important. Training helps prevent mistakes by teaching employees what to watch out for, while technology steps in to handle the more complex attacks. Together, this strategy would protect the company as much as possible with the resources available, making sure both people and tech play their parts in keeping us safe from cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how cyber technology creates opportunities for criminal&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/david-knoepp\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29805,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/users\/29805"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/pages\/133\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/david-knoepp\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}