Cybersecurity, Technology, and Society
This IT/CYSE 200T course explores how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:
- Describe how cyber technology creates opportunities for criminal behavior,
- Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
- Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
- Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
- Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
- Describe the costs and benefits of producing secure cyber technologies,
- Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
- Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
- Describe how cybersecurity produces ideas of progress and modernism.
Course Material
Displayed below, is a writeup on SCADA systems which is also known as (Supervisory control and data acquisition systems), these are the systems that are responsible for administering critical infrastructure task, and are very important for a nations daily task. Below I cover the vulnerabilities that are associated with theses systems, and how they can be critical risk to society as a whole.
The second artifact below, displays the importance of human factors, within the cybersecurity realm, and how detrimental it could be to a business. I further, dive into the way I would deal with this issue, if I where running my own cybersecurity business.
The third artifact below, dives into the importance of the CIA (Confidentiality, Integrity, and Availability) triad model which, is a important aspect for guiding polices within a organization. I further, display the advantages of the model, and how it can improve a organizations security posture.
Redemption-1Human-factor
The-CIA-triad-also-known-as-confidentially