IT/CYSE 200T

Cybersecurity, Technology, and Society

Concept Map:

 

Discussion Board Opportunities for Workplace Deviance:

How has cyber technology created opportunities for workplace deviance?

Due to cyber technology offering security and remote access, it has created opportunities for employees to participate in activities such as personal internet use and online abuse. Furthermore, the complexity of cyber systems presents opportunities for data theft, sabotage, and illegal access, seriously endangering the security and integrity of organizations.

 

DISCUSSION BOARD Protecting Availability:

In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?

The first protection I would implement to ensure the availability of my systems is load balancing. load balancing techniques distribute incoming network traffic across multiple servers. This helps prevent any single server from being overwhelmed and ensures consistent performance. The second protection I would implement is to establish regular backup procedures for critical data and systems. This ensures that data can be quickly restored in the event of data loss or system failure.

 

CIA Triad Write-up:

https://docs.google.com/document/d/1iMoFSM3JGQuT0q635AjT-YXScPASm62y8Wgk2362g60/edit?usp=sharing

 

SCADA Write Up:

200T write up #2

 

Final Essay:

Final essay

 

Final Thoughts:

In the Cybersecurity field, the dynamics of technology, culture, and ethics intertwine to shape both opportunities and challenges. Cyber technology presents avenues for criminal behavior through its interconnected networks. Cultural beliefs influence cybersecurity strategies, impacting how societies perceive privacy and security measures. As a student, engaging in assignments related to cybersecurity has been invaluable in building my understanding of this complex field. Through practical exercises and theoretical study, I’ve learned about the components and mechanisms of cyber systems, as well as the vulnerabilities that can be exploited by malicious actors. This hands-on experience has deepened my appreciation for the ethical dilemmas inherent in cybersecurity, from balancing security imperatives with privacy rights to addressing unintended consequences of cyber operations.

Additionally, my coursework has underscored the aspects of cybersecurity, emphasizing the importance of international cooperation in combating cyber threats effectively. As I engaged in discussion boards with other classmates I’ve gained insights into how cultural beliefs and regulatory frameworks shape cybersecurity practices worldwide. Additionally, engaging with real-world case studies has helped me understand the impact of cyber technology on individuals’ experiences with crime and victimization. By navigating the complexities of technology, culture, and ethics, I’m prepared to contribute to the ongoing dialogue surrounding cybersecurity and work towards a more secure and resilient digital future.