Cybersecurity, Technology, and Society
Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:
- Describe how cyber technology creates opportunities for criminal behavior,
- Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
- Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
- Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
- Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
- Describe the costs and benefits of producing secure cyber technologies,
- Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
- Describe the role of cybersecurity in defining definitions of appropriate and inappropriate behavior,
- Describe how cybersecurity produces ideas of progress and modernism.
Journals
How does your major relate to cybersecurity technology?
I am currently enrolled in the cybersecurity major at Old Dominion and plan to graduate in the spring of 2020. I feel that cybersecurity technology has everything to do with my major. Technology is apart of the everyday lives of almost everyone on this planet in one form or another. Whether it is on our phones, computers, cars, homes, or even clothes, technology influences us every single day. Cybersecurity is a necessity if we want to keep our data secure while using this technology. Many don’t realize just how much of their “personal” lives are out on the internet. Finances, locations, wants, and interests are a few examples of the data about us that gets stored online.
Cybersecurity is like the brakes on our car that aren’t there to stop us from going somewhere but give us the security we need to go faster and farther, knowing that when we get to where we need to go, we will be able to stop safely. In my profession, it is my job to keep others safe while doing their job when it comes to their online presence while also keeping the company I work for safe from attacks from outside threats trying to steal valuable and sensitive information.
Lastly, it is the job of those in cybersecurity to make sure that the software that is running in the items of the internet of things are secure. Making sure that there aren’t any security flaws that might allow a hacker to steal information from the user. Sadly, it’s much easier to be an attacker rather than to safeguard the data. When attacking, it only takes one hole in the software to allow you in, while on the other hand, when defending, it’s your job to try and find every one of those holes and try and patch them before the attackers can find them.
Describe four ethical issues that arise when storing electronic information about individuals.
Many things are stored in your personal life online. From address to health records, there aren’t many things that are off limits when it comes to the storing of personal information. The first ethical issue comes from not giving consent to others that still end up storing your data on their servers. This is a bad thing because it might end up getting out and many others will know information about you that you might have not wanted them to know. On the flip side, being able to store information like health records without needing your consent is what allows hospitals to be able to look into your medical history without you being conscious. The second ethical issue is that of anonymity and confidentiality. If you ask most people if you could take their social security number and post it online they would say absolutely not but what they don’t know is that most of that information already live online. It is becoming increasingly more difficult to protect your private data from prying eyes.
As staying anonymous online becomes more and more important the number of ways people are trying to steal your identity is also increasing. The third issue is the lack of respect for personal privacy. With the IOT the number of devices that are connected to the internet can be scary. Smart fridges, smart lights, smart washers, and driers are just the tip of the iceberg. You also have personal assistants such as the Amazon Alexa or Google Home. These devices are always listening to the conversations that are taking place and could be collecting information that you aren’t even aware of. A study was done that showed if you said keywords in a room with the smart device that within the hour you would start seeing ads for that keyword. This is a huge attack on our personal privacy that we are not only allowing into our house but are paying to use. The final ethical issue is that of those who use technology every day. What are we willing to give for ease of use. The more connected our devices become, the easier it is for someone to gain access to that information. It comes down to whether or not we are willing to sell our lives for the ease of using our smart devices.
How can you tell if your computer is safe?
If there is one question that I hear the most being technologically inclined, is whether a system is secure from any threats that could possibly be threatening it. There are a few things that you can do to make sure that your computer is safe. First, make sure that your computer is as up to date as possible. Any security patches that are missed are a possible security flaw waiting to be exploited. Second, ensure that your firewall is turned on and configured correctly. You can have the tallest wall in the world but if there is a hole in the middle of it, it is basically useless. Third, try to have some form of antivirus on your computer. Whether it’s built-in like Windows security or a third party software like Norton, an anti-virus can help ensure that no malicious software found its way onto your computer. Lastly, just be smart when browsing the internet. Chances are if something seems too good to be true, it probably is. Phishing scams are a huge issue that most people don’t know how to identify. Emails that are sent directly to someone that contain viruses are the most common ways someone can get a virus. There are a few ways to check to see if an email is real or not. First, check and see who the email is from. If you don’t recognize the sender, you should immediately be on high alert. Second, make sure that the sender’s name isn’t one character off from someone you know. Many people click on links whom they thought their friend sent when in reality it was a hacker with a username like their friends. The third thing to look for is misspellings and grammar mistakes. Many shady emails come from people in other countries that English isn’t their first language. Lastly, take a look at the link before clicking on it. If you see a website that you aren’t familiar with or it’s a bunch of letters, there’s a good chance that it’s malicious.
Free Write assignment 1
Blockchain Technology and Voting