IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

Write-up on the CIA triad & Authentication/AuthorizationDarren JonesCYSE 200T2/2/25
BLUFThe CIA triad is an acronym for information security policies and systems that was created to act as a guideline for companies to follow when creating said policies. Authentication is the process of verifying who you are in the system but on the other hand Authorization is verifying what you are allowed to do and access within the system.
CIA TriadCIA Triad stands for “Confidentiality, Integrity and availability,” these are the three cornerstones when it comes to developing security systems.
ConfidentialityFirstly, confidentiality is making sure that information is kept secret or private from entities who do not have access to it. This is one of the most important things when it comes to creating a security system. You must keep information stored in the system away from people who do not have access to it. (Fortinet.com)
IntegritySecondly, integrity is assuring that data stored within the system can not be tampered with from any source. The integrity of data must be maintained to ensure that data is not corrupted or changed in any way. (Fortinet.com)
AvailabilityLastly, availability is assuring that the secured data is accessible to the people who the data belongs to. This means that data needs to be accessible by the people who own it at almost any time. To achieve this the systems and processes need to be up and running at all times. (Fortinet.com)
AuthenticationAuthentication is the process of verifying who you are within the system. This can be done in a multitude of ways but the most popular is usernames and passwords. These usernames and passwords act as the key to a door knob. Turning that key will allow you to open the door to access your information. An example of authentication can be your facial recognition password for your smartphone. Your smart phone will use a scan of your face to allow access to the information within your phone.
AuthorizationAuthorization is the process of verifying what exactly you have access to within the system. This can be done by getting permissions that will be attached to your authentication method of choice. These authorizations are given at a base level once an account has been created which allows you to view your own data. There can be a higher level of authorization that can allow you to view others data as well as your own. An example of authorization levels can be in canvas. The teacher can view all students’ grades but a student can only view their own grades.
ConclusionThe CIA triad is a very important model that is used to ensure data security within companies servers. Its three components are Confidentiality, Integrity and availability. Authentication is the ability to access your information using passwords and authorization is what you are allowed to access within the system after using your password.
Fortinet. “CIA Triad.” Fortinet, n.d., https://www.fortinet.com/resources/cyberglossary/cia-triad

Write-up on SCADA systems: Critical infrastructureDarren JonesCYSE 200T3/30/25
SCADA system stands for: Supervision, Control and Data Acquisition. These systems are put in place to supervise, control and collect data on critical infrastructure systems like water treatment plants, gas pipelines and many more. These critical infrastructure systems are very vulnerable because of the outdated technology used to create them and these SCADA systems help mitigate these vulnerabilities.
Definition of SCADASCADA stands for Supervision, Control and Data acquisition. SCADA is used to watch over critical infrastructure systems. The systems oversee the infrastructure to make sure they are still working. It controls the systems of the infrastructure as needed to make sure they are working correctly. They also collect data from the systems to make sure they are working as well. The most basic form of those systems is PLC’s or programmable logic controllers. (Inductive automation, 2018)

Vulnerabilities in Critical infrastructure
Critical infrastructure is a very important part of people’s lives. Things like roads, water treatment plants, power sources and many more are very important to life in places like the United States. These systems though are huge projects and take a really long time to be put to use, sometimes years. So evidently the technology used while originally creating the system may be completely out of date by time the project is complete. This obviously would make it really hard to uphold the new system since it’s working off of old technology.
How SCADA systems mitigate the vulnerabilitiesSCADA systems mitigate the vulnerabilities of critical infrastructure systems. The ability to remotely supervise the systems makes it easy to tell if the systems are still working as intended. Being able to control them remotely as well makes them easier to use due to some of their locations. The data collection part of Scada also is very helpful because you can output the data and use it for comparisons.
ConclusionSCADA systems are very helpful when it comes to the upkeep and maintenance of all critical infrastructure systems. They actively monitor and record important data that keeps the systems working accordingly.

ReferencesInductive Automation. “What Is SCADA?” Inductive Automation,https://inductiveautomation.com/resources/article/what-is-scada.Accessed 30 Mar. 2025.
Write up on Human factors in CybersecurityDarren JonesCYSE 200T4/6/25
As Chief Information Security officer, I would like to have a fifty five to forty five split of the finances for training for cybersecurity and new cybersecurity technology. I would do this because knowledge about cybersecurity threats can help with mitigating cyber threats. Then new cyber technology will also be very important.
Cyber security trainingCyber security training will take up fifty five percent of the funds I would have available. I would do this because I find that most cybersecurity threats to a company will be due to human error. For example clicking on phishing links and things similar. “About 68% of breaches in a 2024 survey were caused by human factors, such as someone being tricked by a social engineering scam or making an error.” (Jones, ispartnersllc)

New cyber security technologyNew cyber security technology will take up the rest of the budget using the rest of the forty five percent. This money will be used to make sure any and all systems are new and up to date. Firewalls, malware detection systems and reactionary systems will be most important to mitigate cyber threats to our data as much as possible.
ConclusionIn conclusion, if I were the head of information security in my organization I would spend more money on training employees on cybersecurity threats because I believe that they are the most susceptible to causing a cyber attack. Then the rest of the money that is left over will be spent on systems that will prevent cyber attacks from outside sources.

RefrencesJones, A. (2024, November 6). Human error cybersecurity statistics:How mistakes affect data security. IS Partners, LLC.https://www.ispartnersllc.com/blog/human-error-cybersecurity-statistics/