{"id":133,"date":"2025-01-27T16:43:49","date_gmt":"2025-01-27T16:43:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-10-29T14:49:50","modified_gmt":"2025-10-29T14:49:50","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/gabrielj\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n<h1>Course Material<\/h1>\n<p>Gabriel Jacobson<\/p>\n<p><strong>CIA Triad<br \/>\n<\/strong>In cybersecurity, the CIA Triad represents 3 major principles of information security are<br \/>\nConfidentiality, Integrity, and Availability (Chai, 2022). For starters, confidentiality ensures that any kind of information is accessible only to people who are authorized. This works through encryption, access controls, and authentication tools. Also, Integrity just guarantees that data remains untouched by people without access and is still accurate. Techniques like hashing, digital signatures and more help maintain the data\u2019s integrity (Chai, 2022). Lastly, in the CIA, availability helps ensure that information and systems are accessible when actually needed. This involves disaster recovery planning, redundancy, and protection against cyber threats, particularly DDoS attacks, and in total prevents downtime (Chai 2022).<\/p>\n<p>Beyond the CIA triad, there are two very important but distinct security processes. One of them is Authentication. This is different from authorization because this verifies the identity of a user or system before allowing access. This is commonly done through passwords but more modernly, biometrics or multi-factor authentication. The second process is Authorization which determines what a person who was authenticated is allowed to do. Authorization pushes permissions, which makes the users who were permitted only use what they are allowed to use. A great example to tell the difference between the two if you had a bank\u2019s online system requires a customer to log in with a username and password, this is a form of authentication. Once you log in, the system allows the customer to view their account balance but restricts them<br \/>\nfrom accessing administrative settings, and this is authorization.<\/p>\n<p>Overall, Understanding these concepts help organizations implement robust security<br \/>\nmeasures to protect data and maintain efficiency.<br \/>\nCITES:<br \/>\nChai, W. (2022, June 28). What is the CIA Triad? Definition, Explanation, Examples. TechTarget.<br \/>\nhttps:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA<\/p>\n<p><strong>SCADA<\/strong><\/p>\n<p><strong>BLUF:<\/strong>\u00a0SCADA helps manage infrastructure but also brings along risks that can be mitigated to<br \/>\nsecure systems security.<br \/>\n<strong>Vulnerabilities in Critical Infrastructure and how SCADA helps reduce risks<br \/>\n<\/strong>There are Critical infrastructure, such as power grids, water treatment plants, and oil pipelines,<br \/>\nrelies on SCADA systems for efficient operation. SCADA stands for Supervisory control and<br \/>\ndata acquisition. So, as these systems become more connected to IT networks, they face more<br \/>\nrisks.<br \/>\n<strong>The Vulnerabilities<br \/>\n<\/strong>SCADA systems used to be isolate but newer versions use standard protocols like<br \/>\nTCP\/IP and ethernet, making them more vulnerable to cyberattacks. Older systems<br \/>\nwere actually safer because they had closed environments. One risk is unauthorized<br \/>\naccess because with weak authentication methods and an open network it makes it<br \/>\neasier for it to be accessed by penetrators. An example I learned is the attack on<br \/>\nUkraine power grid that caused blackouts. Another concern is malware, SCADA<br \/>\nsystems have been targeted with malware before which makes that a concern.<br \/>\n<strong>How SCADA helps reduce risks<br \/>\n<\/strong>SCADA systems has built in security measures to help protect infrastructure. Using<br \/>\nmulti-factor authentication and role-based access control prevents unauthorized user from accessing any important systems. Another important measure is encrypted<br \/>\ncommunications. Modern SCADA protocols use encryption to secure data. The<br \/>\ndetection and prevention systems they use also help monitor the network in real time<br \/>\ndetecting and blocking potential cyber threats, and to ensure continuous operation,<br \/>\nSCADA systems even use backup and redundancy measures. So if one server fails,<br \/>\nbackup servers and other mechanisms are put into action so that there would be no<br \/>\ndowntime.<br \/>\n<strong>Conclusion<br \/>\n<\/strong>The SCADA systems play a vital role in managing infrastructure but also has a few<br \/>\nissues like anything else. Though, there can be strong security measures much like<br \/>\nencryption, authentication measures, and real time monitoring, helps protect these<br \/>\nsystems. The SCADA article really highlights the need for modern security strategies,<br \/>\nwhile cybersecurity experts emphasize the importance of constant improvements.<br \/>\nSecuring all these systems is essential for maintaining safe and reliable foundation.<br \/>\nCITES:<br \/>\nSCADA Systems Article from scadasystems.net Zetter, K. (2016). Countdown to Zero Day: Stuxnet and the Launch of the World\u2019s First<\/p>\n<p><strong>The Human Factor in Cybersecurity<\/strong><\/p>\n<p><strong>BLUF:<\/strong>\u00a0Balancing employee training, cybersecurity tools, and regular security<br \/>\nchecks is the best way to protect an organization from cyber threats without breaking<br \/>\nthe budget.<br \/>\n<strong>Investing in Employee Training<br \/>\n<\/strong>With a limited budget, I would try to balance the spending between employee<br \/>\ntraining and cybersecurity technology to try to increase security protection and keeping<br \/>\ncosts under control. Human error is always going to be existing and is a major cause of<br \/>\ncyber threats, moving about 40% of the budget to security awareness training.<br \/>\nEducating employees on things like phishing, password management, and safe<br \/>\npractices will reduce the probability of having any breaches. Regular training sessions<br \/>\nand real world scenarios will help make these issues more recognizable and avoid most<br \/>\nthreats.<br \/>\n<strong>Upgrading the Technology<br \/>\n<\/strong>At the same time, there should be roughly another 40%-50% of the budget going toward<br \/>\nstrengthening cybersecurity tech, including firewalls, endpoint protection and automated<br \/>\nthreat detection. Implement things like multi-factor authentication and a zero-trust<br \/>\nsecurity policy would limit unauthorized access and add that extra layer of protection.<\/p>\n<p>The last of the 10%-20% of the budget should go towards security audits and incident<br \/>\nresponse planning to actively identify vulnerabilities and ensure a quick, effective<br \/>\nresponse to threats and attacks. (Smith &amp; Johnson, 2023)<br \/>\n<strong>Conclusion<br \/>\n<\/strong>By combining these techniques like training, advanced tools, and regular assessments,<br \/>\nthe organization can definitely reduce risks while staying in budget. A layered approach<br \/>\nensures both human and technical vulnerabilities are addressed and handled which will<br \/>\ncreate a more secure environment. Investing wisely in these areas helps prevent costly<br \/>\nbreaches and keeps regular business operations running smoothly.<\/p>\n<p><strong>CITES:<br \/>\n<\/strong>Smith, Adam, and Robert Johnson. \u201cMaximizing Security with Technology: Best<br \/>\nPractices for CIOs.\u201d Information Security Review, vol. 18, no. 2, 2023<br \/>\nMiller, John. \u201cCybersecurity Awareness Training: A Critical Defense Against Human<br \/>\nError.\u201d CyberSecurity Journal, vol. 15, no. 3, 2022<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how cyber technology creates opportunities for criminal&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gabrielj\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30321,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gabrielj\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gabrielj\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gabrielj\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gabrielj\/wp-json\/wp\/v2\/users\/30321"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gabrielj\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/gabrielj\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":319,"href":"https:\/\/sites.wp.odu.edu\/gabrielj\/wp-json\/wp\/v2\/pages\/133\/revisions\/319"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gabrielj\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}