Cybersecurity, Technology, and Society
Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:
- Describe how cyber technology creates opportunities for criminal behavior,
- Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
- Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
- Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
- Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
- Describe the costs and benefits of producing secure cyber technologies,
- Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
- Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
- Describe how cybersecurity produces ideas of progress and modernism.
Course Material
Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal, and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.
Be sure to remove this instructional language when you have completed updating content on this page.
Cyber 200T Discussion Board Posts/Write-Ups
Discussion Board: Ethical Considerations of CRISPR Gene Editing- In my opinion CRISPR gene editing presents a revolutionary advancement in genetics and medicine, yet its ethical considerations are intricate and far-reaching. The prospect of editing the human germline, with possible hereditary implications, sparks concerns about unforeseen consequences and the alteration of the gene pool. The notion of “designer babies” raises ethical questions about societal fairness and the risk of creating disparities between those who can afford genetic enhancements and those who cannot. Informed consent is a critical ethical consideration, particularly in clinical trials, where individuals must fully comprehend the risks and ramifications of genetic modifications. Equitable access to CRISPR technology is paramount to prevent exacerbating social and economic inequalities. The chances of unintended consequences, off-target effects, and the dual-use nature of CRISPR for both benevolent and malicious purposes further contribute to the ethical complexity. In navigating these challenges, it is imperative to strike a balance between scientific progress and ethical standards, ensuring responsible use of CRISPR technology through comprehensive regulations, transparent research practices, and ongoing ethical discourse.
Discussion Board: The NIST Cybersecurity Framework- From reading pages 1 – 21 of the NIST Cybersecurity Framework I gathered that from using this framework company’s can benefit remarkably. One of the first benefits I realized is with providing a common language and framework allows companies to access and grow their cybersecurity means. The NIST Cybersecurity Framework is risky due to the fact that they emphasize companies to identify, detect, protect, respond, and recover from cyber attacks. This causes the company to prepare to take care of possible loose ends before it turns into something bigger. I also believe that this framework is another beneficial factor to show the importance of communication. Allowing holders and several departments to connect more on cybersecurity topics. In my future workplace I could see my self using the NIST Cybersecurity Framework as a helpful guide to create and have a consistent cybersecurity strategy. A way that would be possible is by gathering an authentic cybersecurity risk assessment. My goal would to be create a visionary and cooperative approach to ensure protection around the cybersecurity posture.
Write Up:
BLUF –
In the world of cybersecurity, it’s super important to find the right mix between hiring cyber experts and buying cool tech stuff. This essay talks about the tough decisions we have to make when we’re trying to spend money to make our tech and our people better at fighting cyber bad guys. We’re going to look at what’s good and bad about each choice to help figure out how to use our money wisely and keep our stuff safe from hackers.
Introduction-
As a chief information security officer at my company, even though we may not have a ton of cash, it’s up to me and my decision to make sure our cybersecurity is the best of the best. When I’m trying to think if we should spend money on fancy tech or training for our team, I think it’s smarter to do both.
Strategy –
First up, I’m going to use some cash to give our cybersecurity team some serious training. They’ll learn all about the sneaky ways hackers try to mess with us and how to stop them. A team that knows their information means a lot less mistakes and less chance of bad stuff possibly happening. With whatever money is left, I’ll get something decent but not too much money gear and software. Every computer will have antivirus situations, and we’ll put up firewalls and encryption to keep protected from any threats toward the organizations data. All this training and tech should help us avoid cyber disasters. This would lead to a decrease in data breaches, malware functioning, wrongful access, and other serious cyber crimes to the organization.
Conclusion –
In conclusion, we may improve our company’s defenses against cyberthreats while making the most of the limited resources we have by implementing an appropriate plan that mixes employee development with prudent cybersecurity investments. This strategy places a strong impact on the possibilities in which technological advancements and human factors mix to keep our company’s digital assets safe and decrease cybersecurity threats.