IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Journal #1

When searching for a field of study and a future profession the driving factor was putting myself in a position where I would be able to provide a service for the greater good of my country and society. When thinking about my given skills and interests I had been very driven to cybersecurity. Growing up in a time when the internet and computers are more prevalent than ever. In a year, five years, and even one hundred more the world of cyber will only expand. With this expansion of the world of cyber it has a positive relationship with the increase in cybercrime. Open-source code has made an increasing impact inside the business world. Over 40 million people adding, editing, and deleting code every day. When you have people who are not being paid, they have no reason to uphold professional standards. With this code being publicly accessible the way to hack into these organizations has become much easier. It must also be considered there are still generations of people in society who are not very technologically inclined. These are the people who find themselves at high risk of becoming a victim of APT’s, DDoS, Malware attacks, Password attacks, and Phishing emails. All of which can result in the release of vital personal information. I am interested in starting out in a government position to stop such attacks as Russia hacking the oil pipeline. As this devastated the national economics. There is a whole economic class of people who can barely afford to get by as there is now. When having to boost gas prices, it can disrupt an entire way of life. This is why I am interested in cybersecurity technology as I wish to be able to employ that technology to prevent such global attacks. Then further in life after providing myself with ample knowledge and connections. I am interested in exploring the personal side of cybersecurity. As stated in the introduction to the course. It is not just country versus country but also individual versus individual. I am interested in providing protection and target hardening to those who find themselves susceptible to cyber-attacks on their personal information such as credit card information or identity theft. Our elders are an important part of our society, they have so much valuable information, however they are not as informed when it comes to the growing cybercrime. I am set on putting myself in a position to monitor and protect them as well as all from individual attacks.

Journal #2

Old Dominion University (ODU) offers a diverse range of majors that intersect with and significantly contribute to the field of cybersecurity. Among these majors, Computer Science stands out as foundational, providing essential knowledge of programming, algorithms, data structures, and computer systems. This expertise is instrumental in developing secure software, designing encryption algorithms, and comprehending the technical intricacies of cybersecurity systems. Similarly, the Information Technology (IT) program emphasizes managing and maintaining computer systems, networks, and databases, preparing IT professionals to implement cybersecurity measures, configure firewalls, monitor network traffic, and respond to security incidents effectively.

Additionally, a major in Criminal Justice at ODU involves studying the legal and societal aspects of crime and law enforcement, offering insights crucial for understanding criminal behavior, investigative techniques, and legal frameworks related to cybercrime. This knowledge is invaluable in digital forensics and cybersecurity policy development. Engineering majors, including Computer Engineering or Electrical Engineering, provide students with expertise in hardware design, digital systems, and embedded systems. Understanding hardware components is vital for cybersecurity professionals to identify vulnerabilities and develop secure hardware architectures, complemented by problem-solving skills and analytical thinking essential for effective cybersecurity solutions.

These majors intersect with cybersecurity in multifaceted ways, highlighting the interdisciplinary nature of the field. Graduates with combined technical skills and knowledge of criminal justice, legal frameworks, and computer systems management are well-equipped to address complex cybersecurity challenges. Moreover, these diverse majors contribute to cultivating a workforce capable of tackling cybersecurity issues from varied perspectives, ensuring comprehensive protection of digital assets and information systems. The intersection of these majors underscores the importance of interdisciplinary collaboration in cybersecurity education and workforce development, preparing professionals to navigate the evolving landscape of cybersecurity threats and solutions.

Journal #3

Storing electronic information about individuals raises several critical ethical concerns related to privacy, security, and data management. One primary ethical issue is ensuring the privacy and confidentiality of individuals’ electronic data. Safeguarding sensitive personal information, including medical records, financial details, and personal communications, is essential to prevent unauthorized access or disclosure. Individuals have a fundamental right to control who can access their information and how it is utilized, necessitating robust data protection measures and adherence to privacy laws and regulations.

Another significant ethical concern is data security and the risk of breaches. The security of stored electronic information is vital to prevent data breaches and unauthorized access. Ethical dilemmas arise when organizations fail to implement adequate security measures, leading to breaches that expose individuals’ sensitive data. Such breaches can result in identity theft, financial fraud, or reputational harm, underscoring the importance of ethical data handling practices and robust cybersecurity measures.

Ensuring the accuracy and integrity of stored electronic data is also an ethical imperative. Inaccurate or outdated information can adversely impact individuals’ lives, affecting credit scores, employment opportunities, or healthcare decisions. Organizations must maintain accurate records, provide mechanisms for individuals to correct inaccuracies, and ensure transparency in data collection and processing practices.

Additionally, ethical considerations arise concerning data retention and use. Organizations should only collect and retain data that is necessary for legitimate purposes, obtaining individuals’ consent for specific uses. Misuse or unauthorized sharing of stored information for marketing, surveillance, or discriminatory purposes can violate privacy rights and lead to ethical dilemmas surrounding data ownership and consent.

Addressing these ethical issues requires organizations to adopt transparent and accountable data management practices, implement strong security measures, and uphold individuals’ rights to privacy and data protection. Ethical data stewardship promotes trust between organizations and individuals, fostering responsible use of electronic information while respecting privacy and confidentiality principles. By prioritizing ethical considerations in data storage and management, organizations can enhance data security, protect individuals’ privacy, and maintain ethical integrity in the digital age.

Journal #4

Storing electronic information about individuals presents complex ethical challenges related to privacy, security, and data management. One fundamental ethical concern revolves around safeguarding the privacy and confidentiality of individuals’ electronic data. Protecting sensitive personal information, such as medical records, financial details, and personal communications, is crucial to prevent unauthorized access or disclosure. Individuals possess a fundamental right to control who accesses their information and how it is utilized, emphasizing the need for robust data protection measures and strict adherence to privacy laws and regulations.

Another significant ethical consideration is the importance of data security to mitigate the risk of breaches and unauthorized access to stored electronic information. When organizations fail to implement adequate security measures, it can lead to breaches that expose individuals’ sensitive data, resulting in identity theft, financial fraud, or reputational harm. This underscores the critical role of ethical data handling practices and robust cybersecurity measures in maintaining data security and protecting individuals’ privacy.

Ensuring the accuracy and integrity of stored electronic data is also essential from an ethical standpoint. Inaccurate or outdated information can have adverse consequences on individuals’ lives, impacting credit scores, employment opportunities, or healthcare decisions. Organizations must uphold data accuracy by maintaining reliable records, offering mechanisms for individuals to rectify inaccuracies, and ensuring transparency in data collection and processing practices.

Additionally, ethical considerations arise concerning data retention and use. Organizations should limit data collection to what is necessary for legitimate purposes and obtain individuals’ consent for specific uses. Misuse or unauthorized sharing of stored information for marketing, surveillance, or discriminatory purposes can infringe upon privacy rights and raise ethical dilemmas surrounding data ownership and consent.

Addressing these ethical challenges requires organizations to adopt transparent and accountable data management practices, implement robust security measures, and uphold individuals’ rights to privacy and data protection. Ethical data stewardship fosters trust between organizations and individuals, promoting responsible use of electronic information while upholding privacy and confidentiality principles. By prioritizing ethical considerations in data storage and management, organizations can strengthen data security, safeguard individuals’ privacy, and uphold ethical integrity in the digital era.

Journal #5

  1. C – Consulting
  2. Y – YouTube Tutorials
  3. B – Bug Bounty Programs
  4. E – Ethical Hacking
  5. R – Risk Assessment
  6. S – Security Software Development
  7. E – Education and Training.
  8. C – Cyber Incident Response
  9. U – Upgrading Systems
  10. R – Regulatory Compliance
  11. I – Intrusion Detection
  12. T – Threat Intelligence

Journal #6

Cyber technology has significantly expanded the landscape of workplace deviance by offering new avenues for employees to engage in unethical or illegal behaviors within organizational settings. One way cyber technology enables workplace deviance is through unauthorized access and data theft. Employees with access to sensitive information may exploit cyber tools to gain unauthorized entry to data repositories, potentially leading to data theft, privacy breaches, or insider trading. Additionally, disgruntled employees can leverage cyber technology for sabotage or vandalism by disrupting systems, manipulating data, or introducing malware into company networks, thereby causing operational disruptions, financial losses, or reputational harm.

Furthermore, cyber technology serves as a platform for cyberbullying or harassment among employees. Using digital channels like email or social media, individuals may spread rumors, share inappropriate content, or send threatening messages to colleagues or supervisors. Another avenue for workplace deviance facilitated by cyber technology involves unauthorized software use or piracy, where employees install unauthorized software or use pirated programs on company devices, breaching licensing agreements and intellectual property rights.

Moreover, time theft and non-work-related internet use are prevalent forms of workplace deviance enabled by cyber technology. Employees may misuse company resources by excessively browsing non-work-related websites, engaging in social media activities, or playing online games during working hours, resulting in productivity losses. Additionally, cyber technology enables phishing or fraudulent activities within organizational settings, where employees may conduct deceptive email campaigns to obtain sensitive information or perpetrate fraudulent transactions using company resources.

Privacy violations also pose ethical challenges in the workplace, with employees accessing or sharing confidential information without authorization, thereby compromising individuals’ privacy rights and violating organizational policies. To address these issues, organizations must prioritize robust cybersecurity measures, establish clear policies and guidelines, and provide comprehensive cybersecurity awareness training to mitigate risks associated with workplace deviance facilitated by cyber technology. Cultivating a positive organizational culture that values integrity, transparency, and ethical behavior is essential to prevent and address instances of workplace deviance in the digital era.

Journal #7

Developing cybersecurity programs in business involves a balance of costs and benefits that are crucial for protecting sensitive information, maintaining operational continuity, and safeguarding reputation. The costs associated with implementing robust cybersecurity programs include significant initial investments in technology, software, hardware, and infrastructure upgrades. This encompasses acquiring and configuring essential cybersecurity tools such as firewalls, intrusion detection systems, antivirus software, and encryption solutions. Additionally, hiring cybersecurity professionals and providing ongoing training to staff on cybersecurity best practices incur expenses due to the high demand for skilled personnel in this field. Meeting regulatory requirements and industry standards like GDPR, HIPAA, or PCI DSS also involves costs related to compliance assessments, audits, and implementing necessary controls to protect data privacy and security.

Despite these costs, the benefits of developing cybersecurity programs are substantial. A well-developed cybersecurity program helps protect sensitive data from unauthorized access, theft, or manipulation, safeguarding valuable assets such as customer information, intellectual property, and financial records. Furthermore, implementing cybersecurity measures builds trust with customers, partners, and stakeholders, enhancing the organization’s reputation and credibility in the market. Investing in cybersecurity also reduces financial losses associated with security breaches, including costs related to data breaches, regulatory fines, legal fees, and business disruption.

Moreover, effective cybersecurity programs ensure business continuity by minimizing downtime and disruptions caused by cyber incidents, enabling uninterrupted operations and service delivery. Demonstrating strong cybersecurity practices can provide a competitive advantage, particularly in industries where data protection and privacy are critical considerations for customers. Adhering to cybersecurity regulations not only reduces the risk of legal penalties but also underscores the organization’s commitment to ethical practices and corporate responsibility.

In conclusion, while developing cybersecurity programs in business requires upfront investments, the long-term benefits outweigh the initial costs. Investing in cybersecurity is essential for protecting valuable assets, maintaining trust with stakeholders, mitigating financial risks, and ensuring business resilience in an increasingly digital and interconnected world. Organizations that prioritize cybersecurity are better equipped to navigate evolving cyber threats and safeguard their operations and reputation effectively.

Journal #8

To safeguard your computer against cyber threats, it’s important to implement several proactive steps that assess and maintain its security. Begin by installing reputable antivirus or antimalware software and keeping it updated regularly. These programs help detect and remove viruses, malware, and other malicious software that could compromise your computer’s security. Additionally, activate the firewall on your computer to monitor incoming and outgoing network traffic, acting as a barrier against unauthorized access and potential threats.

Keep your operating system and software applications up to date with the latest security patches and updates, as these often include fixes for vulnerabilities exploited by cyber attackers. Use strong, complex passwords for your computer login and online accounts, avoiding easily guessable passwords and considering a password manager for secure storage. Enable two-factor authentication where available to add an extra layer of security to your accounts.

If using a wireless network (Wi-Fi), secure it with a strong password and encryption (e.g., WPA2), avoiding default router settings. Create regular backups of your important files and data to an external storage device or cloud service to restore your files in case of a security incident or hardware failure.

Exercise caution when clicking on links or downloading attachments from unknown or unsolicited sources, as phishing emails and malicious links are common tactics used by cybercriminals to trick users. Regularly monitor your computer for unusual behavior, such as sudden slowdowns or unexpected changes in settings, which could be signs of malware or security breaches.

Lastly, encrypt sensitive data stored on your computer, especially on portable devices like USB drives, to scramble data so that it can only be accessed with the correct decryption key. By following these best practices, you can significantly reduce the risk of cyber threats and ensure the safety and security of your computer and personal data. Regularly review and update your security measures to adapt to evolving cybersecurity threats and maintain a safe computing environment. Taking these proactive steps will help protect your computer and personal information from cyber attacks and unauthorized access.

Journal #9

Computers have significantly influenced global safety by both enhancing security in certain areas and introducing new risks and vulnerabilities. On the safer side, computers have revolutionized emergency response and disaster management. Communication systems powered by computers enable quicker and more efficient coordination among emergency responders during crises. For instance, Geographic Information Systems (GIS) allow responders to map disaster areas, identify critical infrastructure, and allocate resources effectively. Real-time data analysis helps predict and monitor natural disasters, enhancing preparedness and response capabilities.

Moreover, computers play a pivotal role in improving transportation safety. Advanced computer systems control traffic lights, monitor road conditions, and manage public transportation networks to reduce accidents and congestion. Automated safety features in vehicles, such as anti-lock braking systems (ABS) and electronic stability control (ESC), rely on computer algorithms to enhance driver safety. Additionally, aviation heavily relies on computerized navigation and communication systems to ensure the safety and efficiency of air travel.

Despite these advancements, computers also introduce new security challenges, such as increased cyber threats and data breaches. The interconnected nature of computers and the internet exposes individuals and organizations to malware, phishing scams, and data breaches. Cybercriminals exploit vulnerabilities in computer systems to steal sensitive information or disrupt services through ransomware attacks. Privacy concerns arise as well, as widespread data collection and surveillance enabled by computers raise civil liberties issues. Governments and corporations collect vast amounts of data through digital platforms and devices, often without transparent consent or oversight.

Moreover, society’s growing dependence on computerized critical infrastructure, like power grids and healthcare networks, creates vulnerabilities to cyber attacks and disruptions. A cyber attack on critical infrastructure can have far-reaching consequences, impacting public safety, economic stability, and essential services. In summary, while computers have undoubtedly enhanced safety and security, they also pose new challenges that require continuous adaptation and innovation in cybersecurity and technology governance. Balancing the benefits and risks of computer technology is essential to harness its transformative potential while safeguarding individuals, organizations, and societies from emerging threats and vulnerabilities.

Journal #10

Engineers play a critical role in enhancing the safety and security of cyber networks by implementing robust cybersecurity measures, designing secure architectures, and developing innovative technologies to defend against evolving cyber threats. One key contribution of engineers is the implementation of strong authentication and access controls. They design and deploy authentication mechanisms like multi-factor authentication (MFA) and biometric authentication to verify user identities and restrict unauthorized access to sensitive data and critical systems.

Furthermore, engineers design secure network architectures that incorporate principles of defense-in-depth and least privilege. They segment networks, deploy firewalls, and implement intrusion detection/prevention systems (IDS/IPS) to monitor and control traffic flow, isolating critical assets from potential threats. Engineers also play a crucial role in employing encryption protocols to secure data transmissions and protect sensitive information at rest, integrating encryption technologies into applications, databases, and storage systems to mitigate data breaches.

Moreover, engineers conduct regular vulnerability assessments and penetration testing to identify weaknesses in cyber networks, simulating real-world attacks to uncover vulnerabilities and address them proactively. They develop and deploy security software such as antivirus programs, IDS, and SIEM solutions to detect and respond to cyber threats in real-time, continuously updating these tools to adapt to new attack vectors.

Additionally, engineers establish patch management processes to ensure timely security updates for operating systems, applications, and network devices, reducing the risk of exploitation by cyber attackers. They also collaborate with stakeholders to promote cybersecurity awareness and provide training to employees on best security practices, educating users about phishing scams, password hygiene, and social engineering tactics.

In conclusion, engineers leverage their technical expertise and specialized knowledge to design, deploy, and maintain secure cyber networks. By adopting a proactive approach to cybersecurity and integrating security principles into network design and operations, engineers contribute to building resilient and adaptive cyber defenses that protect organizations and individuals from cyber threats. Collaboration among engineers, cybersecurity professionals, and stakeholders is essential to stay ahead of evolving threats and maintain the safety and integrity of cyber networks.

Journal #11

The overlap between criminal justice and cybercrime is profound and continually evolving alongside technological advancements and the increasing sophistication of cyber threats. Criminal justice encompasses law enforcement, criminal law, and the judicial system, while cybercrime involves criminal activities perpetrated using digital technologies. One significant aspect of this overlap is investigation and prosecution, where criminal justice professionals, including law enforcement agencies and prosecutors, investigate and prosecute cybercrimes like hacking, identity theft, fraud, and online harassment. They employ specialized cybercrime units and digital forensics techniques to collect evidence, trace digital trails, and identify perpetrators.

Moreover, the criminal justice system plays a pivotal role in shaping legislation and policies related to cybercrime. Laws governing cyber activities, data privacy, and digital evidence are continuously updated to address emerging threats and safeguard individuals and businesses from cybercrimes. Additionally, international cooperation is essential in combating cybercrimes that transcend national borders, facilitated by international treaties and agreements among law enforcement agencies.

Criminal justice professionals also provide support to cybercrime victims, guiding them through legal processes and advocating for their rights. They ensure that victims receive appropriate assistance, including counseling, restitution, and protection of their privacy. The intersection of criminal justice and cybercrime is closely intertwined with other disciplines discussed in cybersecurity, technology, and society classes.

Understanding the technical aspects of cybercrimes, such as malware propagation and encryption methods, is crucial for criminal justice professionals involved in investigations. Collaboration with cybersecurity experts helps develop strategies for preventing, detecting, and responding to cybercrimes, complementing law enforcement efforts. Moreover, societal attitudes towards cybercrimes and their implications for privacy, trust, and digital rights inform criminal justice responses to cyber threats.

In summary, the intersection of criminal justice and cybercrime highlights the multidisciplinary nature of addressing cybersecurity challenges. Effective collaboration between criminal justice, technology, cybersecurity, and societal disciplines is vital for developing comprehensive strategies to combat cybercrimes, protect digital assets, and uphold legal and ethical standards in an increasingly digital world. By integrating these disciplines, stakeholders can work together to mitigate cyber risks and enhance cyber resilience across society.

Journal #12

The advent of cyber technology has brought about significant transformations in interactions between offenders and victims, ushering in new dynamics and challenges to traditional crime scenarios. This impact is evident across various forms of cybercrimes, such as cyberbullying, online harassment, identity theft, financial fraud, and exploitation. One notable influence of cyber technology on these interactions is the provision of anonymity and perceived distance to offenders, emboldening them to engage in harmful behaviors that they might shy away from in face-to-face encounters. This phenomenon, known as online disinhibition, contributes to increased incidents of cyberbullying, trolling, and harassment, where offenders feel less accountable for their actions.

Moreover, cyber technology empowers offenders to reach a broader audience of potential victims across geographical boundaries, leveraging the internet as a platform for spreading malicious content, scams, and fraudulent schemes globally. This amplifies the impact and scope of victimization. The 24/7 accessibility and perpetual presence facilitated by cyber technology mean that interactions between offenders and victims can occur at any time and location. Offenders can persistently target and monitor victims through online platforms, messaging apps, social media, and email, leading to ongoing victimization and psychological distress.

Additionally, offenders utilize cyber technology to manipulate and deceive victims through phishing scams, fake profiles, or fraudulent schemes, exploiting vulnerabilities in online communication channels. This can have profound psychological effects on both offenders and victims, with victims experiencing anxiety, depression, or social withdrawal, while offenders may exhibit antisocial behaviors facilitated by online anonymity.

The digital nature of cyber interactions poses challenges in identifying offenders and gathering evidence for legal prosecution, often requiring specialized forensic techniques and international cooperation to trace and apprehend perpetrators. Addressing the impact of cyber technology on interactions between offenders and victims demands interdisciplinary collaboration involving criminal justice, cybersecurity, psychology, and social sciences to develop effective strategies for promoting online safety, protecting vulnerable populations, and combating cyber-enabled crimes in the digital age. Through such collaboration, innovative approaches in prevention, detection, and response can be developed to mitigate the complexities and vulnerabilities introduced by cyber technology in the realm of criminal interactions.

Journal #13

Developing effective cyber-policy and infrastructure amidst the uncertainties of evolving cyber threats demands a strategic and adaptive approach that acknowledges the dynamic nature of technology. Given the rapid pace of innovation and the intricate landscape of cyber risks, several key principles must guide this endeavor. First and foremost, cyber-policy development should adopt a risk-based approach, identifying and assessing potential threats and vulnerabilities to tailor policies and infrastructure investments effectively. Collaborative governance is essential, fostering partnerships among government agencies, private sector stakeholders, academia, and civil society to share information, coordinate responses to cyber incidents, and align regulatory frameworks with industry best practices.

Flexibility and adaptability are paramount in cyber-policy design, given the dynamic nature of threats. Policies must be agile enough to accommodate emerging technologies, evolving attack vectors, and changing regulatory landscapes, requiring regular reviews and updates to ensure their relevance and effectiveness. Moreover, investing in cybersecurity capacity building and education is crucial to develop a skilled workforce capable of implementing and complying with cyber-policy measures, enhancing cyber resilience at all levels.

International cooperation is indispensable due to the transnational nature of cyber threats, necessitating collaboration and harmonization of cyber norms and standards across borders. Privacy and human rights protection must be prioritized, striking a delicate balance between security measures and individual freedoms to ensure cybersecurity efforts are conducted within legal and ethical frameworks. Furthermore, investment in research and development initiatives in cybersecurity technologies drives advancements in cyber-policy and infrastructure, fostering innovation and enhancing cyber defenses.

Implementing mechanisms for continuous monitoring and evaluation of cyber-policy effectiveness is essential, enabling policymakers to assess impacts, identify gaps, and adjust strategies accordingly. In summary, developing cyber-policy and infrastructure requires a holistic and forward-thinking approach that promotes collaboration, embraces complexity, and prioritizes adaptability. By integrating these principles into policy-making processes, stakeholders can build resilient cyber ecosystems capable of addressing emerging threats, leveraging technological innovations, and minimizing risks to security and stability.

Leave a Reply

Your email address will not be published. Required fields are marked *