Cybersecurity, Technology, and Society
Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:
- Describe how cyber technology creates opportunities for criminal behavior,
- Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
- Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
- Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
- Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
- Describe the costs and benefits of producing secure cyber technologies,
- Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
- Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
- Describe how cybersecurity produces ideas of progress and modernism.
Course Material
Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal, and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.
Be sure to remove this instructional language when you have completed updating content on this page.
Write-Ups and Discussion Boards From CYSE- 200T
from DISCUSSION BOARD: Protecting Availability
As the CISO I would first implement a 2-step verification process for all employees working for the company as well as contentious security testing at least once a month. Also, I would force all employees who are terminated or no longer working to remove themselves from all confidential documents and email lists. All work computers and laptops will have to install antivirus software. While also having disk arrays to maintain the availability. So, all employees can have assurance that everything is available and reliable.
from Discussion Board: Ethical Considerations of CRISPR Gene Editing
Storing copies of people’s DNA is something that we should not do for many reasons. The risks out way the rewards in this situation and if someone was able to breach the system and get the DNA. Also, I wouldn’t want my DNA to be kept in some organizational database. All of this seems like the wrong thing to do, and we should not continue trying to digitalize our DNA. Also, I don’t know how many people In the US would agree to have their DNA at the free will of others to use.
from Discussion Board: The NIST Cybersecurity Framework
This framework would be very key for businesses to use for many reasons. They could use it as a systematic process that could identify and manage cyber risk. Also, an increased feeling of confidence from customers knowing that their assets are safe, and with this framework not only would it provide confidence for customers but employees as well knowing that they can comfortably share and save information without it being breached or deleted. This framework should simplify operations for the whole company. I could see myself using this framework in my future workplace whether I’m using it to send emails or even just to log onto my work computer.