IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,  and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.

Be sure to remove this instructional language when you have completed updating content on this page.

Some of My work:

Here are some of my personal best write ups and discussion boards that I did that stand out to people.

The “Short Arm” of Predictive Knowledge:

Hans Jonas’s “Short Arm” concept of predictive knowledge highlights the dangers and future consequences that could occur in cyberspace. Cybersecurity must have a new and improved perspective on cyber policy and framework. As human beings, we tend to think about contingency plans and creating new technological pathways. We should also consider the limits of the technology we already have, so we should focus on making security safer for present events as we plan for the future generation of technology.

When thinking about policies and frameworks, we must understand that we are human and things will change in this world. So, we have to make the policies ready for change as we go through it and flexible enough for people to learn from them. As technology grows, most of our security will become outdated because its rapidly switching and improving every year, day, and even minute, that’s life.

Hans Jonas’s ideas taught us that there are always things out there that are dormant and waiting for an attack on us, so future preparation, flexible policies, and working together can keep cyberspace safe and keep us diligent for upcoming events.

Designing the Public Sphere: Information Technologies and the Politics of Mediation

Businesses should regulate and operate differently to ensure everyone has the same power to evolve the new everyday challenges. Markets should be monitored to keep the prices fair, and  their product and the customers be taken advantage of. Businesses should be held accountable for their impact on the cyber world and make sure their technology is socially associated with the others around them. Groups should encourage others, so they can be more transparent and communicate with other communities, as well as regulations, so if anything were to be crossed outside, it wouldn’t be tolerated. Individuals should take responsibility for their actions to be safe from harm. Individuals should have rules set aside with them to ensure their rights are getting heard,no abuse, and no discrimination along with fair and equal opportunities. 

CIA TRIAD:


The CIA triad is a model design based on policies that are guided to
secure information within the organization. The Model is also called the
“AIC” triad to avoid any miscommunication or confusion within the
Central Intelligence Agency. The AIC or “CIA Triad” is the three most
founded and crucial parts of cybersecurity needs. Experts believe it
needs a major upgrade as society today is increasing with more
technology and changing at a vastly rate.
The History of the CIA triad
The CIA triad was founded over time and it doesn’t have a person who
created it. “Confidentiality” may have been established first as early as
1976 by the U.S. Air Force. Integrity was the second founded and they
were founded in 1987 in a paper titled “A Comparison of Commercial and
Military Computer Security Policies” Written by David Clark and David
Wilson. Since the paper needed more people for data corrections and

account records that created “Availability” and it became a huge
widespread in 1988.
Authentication & Authorization
Authentication is verifying someone’s identity to give them access to get
into private websites and pieces of information, For exam 2FA (two –
Factor Authentication) It is for logins for now because people keep getting
into people’s profiles and stealing private information from across countries.
This is extremely important because we have been having multiple attacks
and they have been attempting to hack within the 2FA but it prevents any
more potential break-ins to keep our information safe.
Authorization is determining the user level of access and giving them the
same amount based on what level of access they are in to keep it more
fairground because giving too much access can cause more chaos and
seem that might use that access into the wrong hands, For Example.
person having admin at a bank office and opening all the access at the
bank.