{"id":133,"date":"2024-09-04T15:21:51","date_gmt":"2024-09-04T15:21:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-11-14T17:56:58","modified_gmt":"2024-11-14T17:56:58","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/evaladez\/it-cyse-200t-2\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1532\" height=\"1061\" src=\"https:\/\/sites.wp.odu.edu\/evaladez\/wp-content\/uploads\/sites\/36788\/2024\/11\/28F-2-edited-1.jpg\" alt=\"\" class=\"wp-image-396\" style=\"width:126px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/evaladez\/wp-content\/uploads\/sites\/36788\/2024\/11\/28F-2-edited-1.jpg 1532w, https:\/\/sites.wp.odu.edu\/evaladez\/wp-content\/uploads\/sites\/36788\/2024\/11\/28F-2-edited-1-300x208.jpg 300w, https:\/\/sites.wp.odu.edu\/evaladez\/wp-content\/uploads\/sites\/36788\/2024\/11\/28F-2-edited-1-1080x748.jpg 1080w, https:\/\/sites.wp.odu.edu\/evaladez\/wp-content\/uploads\/sites\/36788\/2024\/11\/28F-2-edited-1-768x532.jpg 768w\" sizes=\"(max-width: 1532px) 100vw, 1532px\" \/><\/figure><\/div>\n\n<h3 class=\"p1\" style=\"text-align: left\">Cybersecurity, Technology, and Society<\/h3>\n<p>Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n<p class=\"p1\">\u00a0<\/p>\n\n\n<div class=\"wp-block-cover alignfull has-parallax\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-40 has-background-dim\"><\/span><div role=\"img\" class=\"wp-block-cover__image-background wp-image-419 has-parallax\" style=\"background-position:50% 50%;background-image:url(http:\/\/sites.wp.odu.edu\/evaladez\/wp-content\/uploads\/sites\/36788\/2024\/11\/2150061984-1.jpg)\"><\/div><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Course Material<\/h3>\n\n\n\n<div class=\"wp-block-group alignwide is-content-justification-space-between is-nowrap is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-cover is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#f4d6f9\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-center has-large-font-size\">Write-Up<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/evaladez\/wp-content\/uploads\/sites\/36788\/2024\/11\/SCADA-1.pdf\" class=\"pdfemb-viewer\" style=\"width: 800px; height: 800px; \" data-width=\"800\" data-height=\"800\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">SCADA-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#fbf6ff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-center has-large-font-size\">Critical Infrastructure Vulnerabilities<\/p>\n\n\n\n<p>This write-up discusses the vulnerabilities in SCADA (Supervisory Control and Data Acquisition) systems, which are essential for managing and supervising industrial processes in critical infrastructure sectors like energy, water, and transportation. As critical infrastructure becomes more interconnected, the risk of cyberattacks grows, with threats like ransomware and GPS spoofing becoming increasingly common. SCADA systems help mitigate these risks by monitoring and controlling industrial operations, detecting alarms, and alerting operators to abnormal behavior or threats.<\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-2 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-cover is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#f2e6fd\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-center has-large-font-size\">The Human Factor<\/p>\n\n\n\n<p>This write-up emphasizes the critical role of employee training in cybersecurity, particularly in reducing human error, which accounts for 95% of cyber breaches. It advocates for a two-pronged approach: first, investing in comprehensive employee training to raise awareness and improve decision-making, and then implementing key technological defenses such as firewalls, endpoint protection, and multi-factor authentication (MFA). By prioritizing human factor training and reinforcing it with robust security tools, organizations can create a strong, multi-layered defense against cyber threats. <\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#edbdf6\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-center has-large-font-size\">Write-Up<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/evaladez\/wp-content\/uploads\/sites\/36788\/2024\/11\/HumanFactor-1.pdf\" class=\"pdfemb-viewer\" style=\"width: 800px; height: 800px; \" data-width=\"800\" data-height=\"800\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">HumanFactor-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignwide is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-3 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-cover is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#c89bd0\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-center has-large-font-size\">Write-Up<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/evaladez\/wp-content\/uploads\/sites\/36788\/2024\/11\/CIATriad-WriteUp.pdf\" class=\"pdfemb-viewer\" style=\"width: 800px; height: 800px; \" data-width=\"800\" data-height=\"800\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CIATriad-WriteUp<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover is-light\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#dfccf1\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-center has-large-font-size\">The CIA Triad<\/p>\n\n\n\n<p>This write-up explains the CIA triad\u2014Confidentiality, Integrity, and Availability\u2014 which is a foundational model in information security. It outlines each component&#8217;s role in protecting organizational data, ensuring privacy, accuracy, and accessibility for authorized users. The write-up also discusses how authentication (verifying identity) and authorization (defining access rights) support the CIA triad. Using the example of an ATM, the paper illustrates how these principles are applied in real-world scenarios. Ultimately, it highlights how the CIA triad and related concepts work together to strengthen an organization&#8217;s security posture and protect its assets.<\/p>\n<\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how cyber technology creates opportunities for criminal [&hellip;]<\/p>\n","protected":false},"author":29522,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"hide_page_title":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/evaladez\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/evaladez\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/evaladez\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evaladez\/wp-json\/wp\/v2\/users\/29522"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/evaladez\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/evaladez\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":425,"href":"https:\/\/sites.wp.odu.edu\/evaladez\/wp-json\/wp\/v2\/pages\/133\/revisions\/425"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/evaladez\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}