IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

  • Discussion Board – Protecting Availability

    Instructions: In this discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)? In order to protect availability, the first step I would take is to get a lay of the land. I would look at what the network looks like, what……

  • Discussion Board – The NIST Cybersecurity Framework

    Instructions: From your readings of pages 1 – 21 of the NIST Cybersecurity Framework, what benefit can organizations gain from using this framework, and how would you use it at your future workplace? Organizations can use the NIST Framework to benefit them in many areas, such as effective cybersecurity goal setting, understanding how they are……

  • Discussion Board – Going on a Job Hunt

    Instructions: Using the article 50 Cybersecurity Titles That Every Job Seeker Should Know About Links to an external site., research two or more of these jobs that are of interest to you. What disciplines do you see represented in these 50 jobs? What skills are required for the two jobs you selected? What was your biggest surprise?……

  • Write Up on The CIA Triad

    Ian Hagmann 9/18/2022 The CIA Triad I have already learned about the CIA Triad in my first cybersecurity class, and hurray I remembered it correctly. Some of the examples seem to kind of stretch the definitions of each part to make them interconnect better. The Triad The CIA Triad has three parts to it and……

  • Write Up on SCADA Systems

    Ian Hagmann 11/6/2022 SCADA’s Role in Critical Infrastructure Critical infrastructure and SCADA systems were not originally made with cybersecurity in mind. SCADA systems have to work properly and securely to mitigate risks associated with critical infrastructure. Vulnerabilities in Critical Infrastructure Critical infrastructure is critical by nature and therefore affects a lot when things don’t work……

  • Write Up on The Human Factor in Cybersecurity

    Ian Hagmann 11/20/2022 Cybersecurity Spending Allocating funds for cybersecurity is very important as no company has unlimited spending for it. Finding a good balance between training and technologies is a broad start to cybersecurity funding. Importance of Cybersecurity Training Humans are the weakest link in cybersecurity. We are the reason why phishing exists, why spam……