Cybersecurity, Technology, and Society
Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:
- Describe how cyber technology creates opportunities for criminal behavior,
- Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
- Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
- Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
- Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
- Describe the costs and benefits of producing secure cyber technologies,
- Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
- Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
- Describe how cybersecurity produces ideas of progress and modernism.
Course Material
In CYSE 200T, we learned the very basics of cybersecurity as well as the different effects that society and people in general have on the field. This was my very first cybersecurity class at ODU, and the artifacts from this course clearly show that fact when compared to my later coursework.
Artifacts
In the Analytical Paper, “Importance, Risks and Regulations of Humans in Cybersecurity”, I was tasked with explaining the importance of the role humans play in cybersecurity itself. This better helped me to learn just how important humans actually are in cybersecurity, for both good and bad reasons.
The following artifact is a discussion board about the subject of Predictive Knowledge, and how unfortunately it is not yet good enough to prevent cyber attacks. This allows criminals to exploit vulnerabilities that predictive knowledge hasn’t found yet, allowing them the opportunity to break the law, one that many take. As this was a discussion board, I have also included my response to a fellow classmates post at the bottom of the artifact.
The final artifact is another discussion board, this one discussing the importance of regulations in the cyber space. It discusses how because humans have such a massive influence on the cyber world, there should be laws and regulations to insure it is not misused, with more regulations based on the amount of power and influence held by that particular party. Again my response to a classmate is included after my main post.