{"id":133,"date":"2024-09-17T23:45:07","date_gmt":"2024-09-17T23:45:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-04-26T01:02:36","modified_gmt":"2025-04-26T01:02:36","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/djone133cyse201s\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n<h1>Course Material<\/h1>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Write-up on the CIA triad &amp; Authentication\/Authorization<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Darren Jones<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CYSE 200T<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2\/2\/25<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">BLUF<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The CIA triad is an acronym for information security policies and systems that was <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">created to act as a guideline for companies to follow when creating said policies. Authentication <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">is the process of verifying who you are in the system but on the other hand Authorization is <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">verifying what you are allowed to do and access within the system.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CIA Triad<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CIA Triad stands for \u201cConfidentiality, Integrity and availability,\u201d these are the three <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cornerstones when it comes to developing security systems.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Confidentiality<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Firstly, confidentiality is making sure that information is kept secret or private from entities who <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">do not have access to it. This is one of the most important things when it comes to creating a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">security system. You must keep information stored in the system away from people who do not <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">have access to it. (Fortinet.com)<\/span><\/div>\n<\/div>\n<\/div>\n<div class=\"endOfContent textLayer--absolute active\"><\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Integrity<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Secondly, integrity is assuring that data stored within the system can not be tampered with from <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">any source. The integrity of data must be maintained to ensure that data is not corrupted or <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">changed in any way. (Fortinet.com)<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Availability<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Lastly, availability is assuring that the secured data is accessible to the people who the data <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">belongs to. This means that data needs to be accessible by the people who own it at almost any <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">time. To achieve this the systems and processes need to be up and running at all times. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Fortinet.com)<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Authentication<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Authentication is the process of verifying who you are within the system. This can be <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">done in a multitude of ways but the most popular is usernames and passwords. These usernames <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and passwords act as the key to a door knob. Turning that key will allow you to open the door to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">access your information. An example of authentication can be your facial recognition password <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">for your smartphone. Your smart phone will use a scan of your face to allow access to the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">information within your phone.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Authorization<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Authorization is the process of verifying what exactly you have access to within the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">system. This can be done by getting permissions that will be attached to your authentication <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">method of choice. These authorizations are given at a base level once an account has been <\/span>created which allows you to view your own data. There can be a higher level of authorization that can allow you to view others data as well as your own. An example of authorization levels can be in canvas. The teacher can view all students&#8217; grades but a student can only view their own grades.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Conclusion<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">The CIA triad is a very important model that is used to ensure data security within companies <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">servers. Its three components are Confidentiality, Integrity and availability. Authentication is the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ability to access your information using passwords and authorization is what you are allowed to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">access within the system after using your password.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"TextLayer-container\">\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Fortinet. &#8220;CIA Triad.&#8221;<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Fortinet<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, n.d., <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/www.fortinet.com\/resources\/cyberglossary\/cia-triad<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\n<div class=\"annotationLayer\" data-main-rotation=\"0\">\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Write-up on SCADA systems: Critical infrastructure<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Darren Jones<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CYSE 200T<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3\/30\/25<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">system stands for: Supervision, Control and Data Acquisition. These systems are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">put in place to supervise, control and collect data on critical infrastructure systems like water <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">treatment plants, gas pipelines and many more. These critical infrastructure systems are very <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">vulnerable because of the outdated technology used to create them and these SCADA systems <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">help mitigate these vulnerabilities.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Definition of SCADA<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA stands for Supervision, Control and Data acquisition. SCADA is used to watch <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">over critical infrastructure systems. The systems oversee the infrastructure to make sure they are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">still working. It controls the systems of the infrastructure as needed to make sure they are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">working correctly. They also collect data from the systems to make sure they are working as <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">well. The most basic form of those systems is PLC\u2019s or programmable logic controllers. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(Inductive automation, 2018)<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute active\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Vulnerabilities in Critical infrastructure<\/span><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Critical infrastructure is a very important part of people&#8217;s lives. Things like roads, water <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">treatment plants, power sources and many more are very important to life in places like the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">United States. These systems though are huge projects and take a really long time to be put to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">use, sometimes years. So evidently the technology used while originally creating the system may <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">be completely out of date by time the project is complete. This obviously would make it really <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">hard to uphold the new system since it\u2019s working off of old technology.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">How SCADA systems mitigate the vulnerabilities<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA systems mitigate the vulnerabilities of critical infrastructure systems. The ability <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to remotely supervise the systems makes it easy to tell if the systems are still working as <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">intended. Being able to control them remotely as well makes them easier to use due to some of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">their locations. The data collection part of Scada also is very helpful because you can output the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">data and use it for comparisons.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Conclusion<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">SCADA systems are very helpful when it comes to the upkeep and maintenance of all critical <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">infrastructure systems. They actively monitor and record important data that keeps the systems <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">working accordingly.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">References<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Inductive Automation. &#8220;What Is SCADA?&#8221;<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Inductive Automation<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">,<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/inductiveautomation.com\/resources\/article\/what-is-scada.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Accessed 30 Mar. 2025.<\/span><\/div>\n<\/div>\n<div>\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Write up on Human factors in Cybersecurity<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Darren Jones<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">CYSE 200T<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">4\/6\/25<\/span><\/div>\n<div class=\"textLayer\"><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">As<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Chief Information Security officer<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, I would like to have a<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">fifty five to forty five <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">split of the finances for training for cybersecurity and new cybersecurity technology. I would do <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">this because knowledge about cybersecurity threats can help with mitigating cyber threats. Then <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">new cyber technology will also be very important.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cyber security training<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Cyber security training will take up fifty five percent of the funds I would have available. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">I would do this because I find that most cybersecurity threats to a company will be due to human <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">error. For example clicking on phishing links and things similar. \u201cAbout 68% of breaches in a <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2024 survey were caused by human factors, such as someone being tricked by a<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">social <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">engineering<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">scam or making an error.\u201d (Jones, ispartnersllc)<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute active\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">New cyber security technology<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">New cyber security technology will take up the rest of the budget using the rest of the <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">forty five percent. This money will be used to make sure any and all systems are new and up to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">date. Firewalls, malware detection systems and reactionary systems will be most important to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">mitigate cyber threats to our data as much as possible.<\/span><\/div>\n<div><\/div>\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Conclusion<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">In conclusion, if I were the head of information security in my organization I would <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">spend more money on training employees on cybersecurity threats because I believe that they are <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the most susceptible to causing a cyber attack. Then the rest of the money that is left over will be <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">spent on systems that will prevent cyber attacks from outside sources.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Refrences<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Jones, A. (2024, November 6).<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Human error cybersecurity statistics:<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">How mistakes affect data security<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. IS Partners, LLC.<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/www.ispartnersllc.com\/blog\/human-error-cybersecurity-stati<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">stics\/<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><\/div>\n<\/div>\n<\/div>\n<div class=\"PDFAnnotationLayer-container\">\n<div class=\"annotationLayer\" data-main-rotation=\"0\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how cyber technology creates opportunities for criminal&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/djone133cyse201s\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29692,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/djone133cyse201s\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/djone133cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/djone133cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/djone133cyse201s\/wp-json\/wp\/v2\/users\/29692"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/djone133cyse201s\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/djone133cyse201s\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":306,"href":"https:\/\/sites.wp.odu.edu\/djone133cyse201s\/wp-json\/wp\/v2\/pages\/133\/revisions\/306"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/djone133cyse201s\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}