CYSE 201S

CYSE 201 addresses the social, political, legal, criminological, and economic aspects of
cybersecurity through a social science framework.

  • Writing Assignments:

Explain how the principles of science relate to cybersecurity?

Being the subfield of computer science, people in cyber security often use their scientific knowledge to invent more convenient applications. The principle of cybersecurity is based on two important parts: first, keeping the information confidential from the attackers and other unauthorized groups or individuals. Second, assuring that the confidentiality of the information is not prohibiting the authorized user from accessing the information.

Brief explanation of the three principles of cybersecurity: Confidentiality, protecting the information from hackers should be the topmost priority of any cybersecurity personal. Most businesses use a cloud-based system to protect their client’s information. It requires permission for any user to access the information. If the business cannot verify the customer’s identity, they are not given access to the information. Second is integrity, ensuring that the information stays accurate and protected from unauthorized changes. To achieve integrity, the cybersecurity person, must put efforts to consistently communicate among the team about any changes or modifications to the information. Lastly, availability of the information, backing up data in a timely manner should be habitual practice for any cybersecurity person in case of any unforeseen situation like outage.

Review Maslow’s Hierarchy of Needs and explain how each level relates to your experiences with technology.  Give specific examples of how your digital experiences relate to each level of need.

  • Physiological needs – Taking breaks in a timely manner when working for a long period of time in a technological field is much needed.
  • Safety needs – As a current junior IT student and with the knowledge I have earned in the past 3 years, I have understood keeping information safe online is very important. With all the benefits that come with the internet also bring the risks that can ruin someone’s life. I believe basic knowledge about safety related to internet usage should be provided to everyone.
  • Social needs – Staying connected with other people in IT field can help us be aware of new technologies updates and could be helpful in resolving or troubleshooting the technical problems. Building a connection with others in the field can help us look at the problem with various perspectives and can introduce us with new solutions.
  • Esteem needs – As a network specialist at work, I support all the departments with any technical issues. My work requires being reactive as all the users are relying on us to fix the problem so they can continue their job, and that feeling of being valued at work is a reward for me. Being able to use the skills and knowledge I have learned from being in a school assures me great status in the IT field.
  • Cognitive needs – Working in an IT field is like getting challenged and learning lessons on a daily basis, anytime we get new update on software, electronic devices, or any new way of troubleshooting the problem is always a leaf me with a new learning experience. As a network specialist I have the ability and opportunities to show non-technical users the magic of technology. Fixing their technical issues and helping them continue their work.
  • Aesthetic needs – In technology profession it can described as the more the practice, the more the proficiency. For example, when I was new at my job, I used to take a long time to figure out the cause of the issue on devices, and now after years of practice I can look at the device at work and 90% of the time can figure out the cause just by looking at it.
  • Self-actualization needs – To define this stage in my digital experience, I would state that I tend to use all my knowledge that I have learned from school. For example, at my workplace confidentiality of information is the top priority for us as I have control over +300 user profiles. I learned about the confidentiality of the information policy at school; also, I follow the proper troubleshooting steps and remember to document every incident. With this best practice and the skills learned from school, assist me stay accurate and consistent with the information.