Cybersecurity, Technology, and Society
Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:
- Describe how cyber technology creates opportunities for criminal behavior,
- Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
- Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
- Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
- Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
- Describe the costs and benefits of producing secure cyber technologies,
- Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
- Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
- Describe how cybersecurity produces ideas of progress and modernism.
Course Material
Write UP ON SACADA SYSTEMS
Directions:
In this write-up you may use the SCADA Systems articleLinks to an external site., along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.
This write-up is to be IN YOUR OWN WORDS, and must reference the aforementioned article, and at least one additional source of your choosing.
Write Up – The Human Factor in Cybersecurity
Directions: During this week’s reading, you’ve been exposed to different points of view regarding human contribution to cyber threats. Now, put on your Chief Information Security Officer hat. Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology? That is, how would you allocate your limited funds? Explain your reasoning.
Cyber/Analytical Presentation
Directions: In this final GROUP assignment for CYSE-200, you will create and deliver a presentation on cybersecurity principles to a group of high school seniors. You are the teacher(s)!
Imagine the high school version of yourself. You likely knew little about cybersecurity besides what you’ve seen in movies. This is who you are presenting to.
Parameters
Your team is to select four cybersecurity topics you’ve learned in class. You pick which four topics to present (we’ve covered many). Be sure that you cover the topic thoroughly to include the following…
- What is it (Basic Definitions)
- Why is it important?
- How is it used? Examples
- Other information as needed (You Decide)
However, each team must conclude their presentation by discussing one of the two philosophical topics covered toward the end of class. You can pick either:
1) Do we need to consider regulatory changes in the face of rapidly evolving datafication and intellification of our environment, or…
2) Are we adequately thinking through the long-term impact of technologies being developed today (the short arm of predictive knowledge)?
Describe the challenges and proposed solutions for each, and provide examples to back up your thoughts.
Each student must present one topic, which can be offered on no less than three slides and no more than five.
Each group will present to the class.
Lastly, please upload your presentation to notebook.lmLinks to an external site. and Create a PodCast of your presentation. Include a link to the podcast in your presentation.
Write-Up: The CIA Triad
Using the Chai Article (Links to an external site.), along with additional research you will conduct on your own, describe the CIA Triad, and the differences between Authentication & Authorization, including an example.