{"id":133,"date":"2025-05-18T23:27:38","date_gmt":"2025-05-18T23:27:38","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-06-13T00:06:41","modified_gmt":"2025-06-13T00:06:41","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/it-cyse-200t-2\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">CYSE 200T Cybersecurity, Technology, and Society<\/h2>\n\n\n\n<p>This course examined the intersection of cybersecurity and modern technology through cultural, legal, ethical, and business perspectives. I developed a broad understanding of how cybersecurity challenges are shaped by and impact social systems, organizational policy, and global infrastructure. Topics included the ethical implications of data security, the role of regulation in tech-driven environments, and the strategic importance of cybersecurity in business and government decision-making.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Skills<\/h2>\n\n\n\n<ol>\n<li>Cybersecurity policy and governance<\/li>\n\n\n\n<li>Sociotechnical risk assessment<\/li>\n\n\n\n<li>Ethical decision-making in tech<\/li>\n\n\n\n<li>Cross-disciplinary thinking<\/li>\n\n\n\n<li>Clear communication of complex ideas<\/li>\n\n\n\n<li>Ethical awareness and accountability<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Experience<\/h2>\n\n\n\n<p><strong>Skill Highlighted:<\/strong>&nbsp;<em>Cybersecurity Policy and Governance<\/em><br><strong>Also Demonstrates:<\/strong><br><em>Ethical Decision-Making in Tech<\/em>,&nbsp;<em>Sociotechnical Risk Assessment<\/em>,&nbsp;<em>Cross-Disciplinary Thinking<\/em>,&nbsp;<em>Clear Communication of Complex Ideas<\/em>,&nbsp;<em>Ethical Awareness and Accountability<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>This interdisciplinary research essay explores the ethical responsibilities of cybersecurity professionals by evaluating systems like the CIA Triad, authentication\/authorization processes, and SCADA applications in hospital boiler infrastructure. Using philosophical reflections from Hans Jonas and real-world technical examples, I argue for proactive policy frameworks that prioritize human-centered design, security, and social responsibility. This artifact demonstrates my ability to communicate complex technical concepts through an ethical lens and assess real-world cybersecurity strategies in relation to public safety and predictive system limitations.<\/p>\n<\/blockquote>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-content\/uploads\/sites\/39101\/2025\/06\/200T.docx.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">200T.docx<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 200T Cybersecurity, Technology, and Society This course examined the intersection of cybersecurity and modern technology through cultural, legal, ethical, and business perspectives. I developed a broad understanding of how cybersecurity challenges are shaped by and impact social systems, organizational policy, and global infrastructure. Topics included the ethical implications of data security, the role of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jessicaaliids\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":15711,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/users\/15711"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":469,"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/pages\/133\/revisions\/469"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jessicaaliids\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}