{"id":133,"date":"2025-01-24T05:55:54","date_gmt":"2025-01-24T05:55:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-04-27T17:50:09","modified_gmt":"2025-04-27T17:50:09","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kerinadrum\/it-cyse-200t-2\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p><span style=\"color: #000000\">In this course, I explored the interdisciplinary connections between technology and cybersecurity, examining how technological advancements impact cultural, political, legal, ethical, and business domains. Key focus areas included how cyber technology creates opportunities for criminal behavior, the cultural influences on cybersecurity strategies, and how cyber systems introduce security concerns. I studied the effects of technology on crime and victimization, the ethical dilemmas arising from cybersecurity efforts, and the global implications of cybersecurity practices. Additionally, I analyzed the costs and benefits of secure technologies and discussed how cybersecurity shapes definitions of appropriate behavior, progress, and modernism.<\/span><\/p>\n<hr \/>\n<h1 style=\"text-align: center\">Course Material<\/h1>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p class=\"has-text-align-center\"><strong>Spotlight Assignment: <\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Cybersecurity Presentation<\/strong><\/h2>\n\n\n\n<p>Team Nebula and I presented to our &#8220;High School Seniors&#8221; class about cybersecurity topics we have learned during our semester in Professor Duvall&#8217;s class. My team chose topics: The CIA triad, Malware, Proactivity in Cyber, Cybersecurity Policy, and a philosophical topic answering the question: &#8220;Are we adequately thinking through the long-term impact of technologies being developed today<br>(the short arm of predictive knowledge)?&#8221; <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/200T-Presentation-backup-plan-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">200T-Presentation-backup-plan-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>This was a fun and engaging presentation that reaffirmed my knowledge of cybersecurity fundamentals. Presenting and answering questions was a great way to sum up a semester&#8217;s worth of lectures and engagement. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/69bdc3b9-da14-4f2d-a823-fc06b0a80d5e.jpg\" alt=\"\" class=\"wp-image-470\" srcset=\"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/69bdc3b9-da14-4f2d-a823-fc06b0a80d5e.jpg 768w, https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/69bdc3b9-da14-4f2d-a823-fc06b0a80d5e-225x300.jpg 225w, https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/69bdc3b9-da14-4f2d-a823-fc06b0a80d5e-630x840.jpg 630w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">This is me (Kerina Drummond) presenting the cybersecurity presentation.<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Special Speakers Free-Write<\/h2>\n\n\n\n<p>Throughout CYSE 200T, we had a few spectacular speakers come and share their experiences in the Cyber Field with us. These speakers always left a lasting impression, and we were able to convey these feelings in short essays shown below. <\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Neal Millar<\/h5>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/Neal-Millar_-Guest-Presenter.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Neal-Millar_-Guest-Presenter<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Doris Locking<\/h5>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/Doris-Locking-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Doris-Locking-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Darren Spencer<\/h5>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/Speaker-Darren-Spencer.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Speaker-Darren-Spencer<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"576\" src=\"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/20250416_121321.jpg\" alt=\"\" class=\"wp-image-469\" style=\"width:686px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/20250416_121321.jpg 768w, https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/20250416_121321-300x225.jpg 300w, https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-content\/uploads\/sites\/38234\/2025\/04\/20250416_121321-400x300.jpg 400w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Our 200T class with speaker Darren Spencer<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Discussions<\/h2>\n\n\n\n<p>Discussion posts have allowed me to share my ideas on specific topics with my fellow peers and to read their ideas as well. I explored a topic that engaged my critical thinking skills. A few of my two favorite discussion posts are below.<\/p>\n\n\n<h2 class=\"css-tz46fa-view-heading\" dir=\"ltr\" data-testid=\"message_title\"><span aria-hidden=\"true\">Discussion Board &#8211; The &#8220;Short Arm&#8221; of Predictive Knowledge<\/span><\/h2>\n<div class=\"userMessage\">\n<p>From this week&#8217;s Jonas Reading: How should we approach the development of cyber-policy and infrastructure given the \u201cshort arm\u201d of predictive knowledge?<\/p>\n<p>My response:<\/p>\n<p>Approaching the development of cyber policy and infrastructure we need to proceed with caution and a strong ethical foundation. In the article, Jonas points out that old ethics are not the same as new ethics and we must proceed with an ethical foundation to ensure as new technologies are developed individuals privacy and protection is put first.\u00a0<\/p>\n<p>When developing new technology it is hard to predict how it may affect us in the future. For example, a router that stops all threats today could tomorrow be a backdoor into the system. The same goes with the development of policy and infrastructure not just the technical tools.\u00a0<\/p>\n<p>To combat this unforeseen future, just like Jonas, I agree that caution and ethics are necessary to create policy and infrastructure for the future.<\/p>\n<\/div>\n<h2 class=\"css-tz46fa-view-heading\" dir=\"ltr\" data-testid=\"message_title\"><span aria-hidden=\"true\">Discussion &#8211; From Verbeek&#8217;s writing (Mod 6, Reading 4) Designing the Public Sphere: Information Technologies and the Politics of Mediation<\/span><\/h2>\n<div class=\"userMessage\">\n<p>How should markets, businesses, groups, and individuals be regulated or limited differently in the face of diminishing state power and the intelligification (Verbeek, p217) and networking of the material world?\u00a0<\/p>\n<p>My response:<\/p>\n<p>Kerina Drummond<br \/>4\/25\/2025<br \/>CYSE 200T<br \/>Professor Duvall<\/p>\n<p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<strong>\u00a0\u00a0Intelligification and the Diminishing State Power<\/strong><br \/>BLUF: This article discusses the need for strong regulations as our world comes online. An increase in smart devices has led to the need for updated policies to stay ahead and ensure the safety and security of our physical and digital worlds.\u00a0<\/p>\n<p><strong>Intelligification<\/strong><br \/>As our world evolves, we&#8217;re becoming a more active and intelligent counterpart. Verbeek discusses the intelligification of our world. \u00a0Common items such as vehicle doors, beds, and even mirrors are becoming smart and impact the way we move through daily life. The new role that technology plays in society has become widespread, and requires that processes need to be reinvented. With access to information at our fingertips, many boundaries of our material world and society must be redrawn, and proper legislation to regulate this new realm of life.\u00a0<\/p>\n<p><strong>Regulations<\/strong><br \/>\u00a0 \u00a0 The development of technology is beginning to blur the lines between humans and devices. With this blend of humans and technology, markets, businesses, groups, and individuals must create proper regulations and guidelines to follow to ensure security. For example, Verbeek Claims security policy, privacy legislation, and Commercial activities will all need changes in their regulations to incorporate the digital world. We can no longer rely solely on government officials, but create policies and security measures starting at the vendor level. It is hard to predict where we will end up with technology, so we must stay proactive to keep ourselves safe.\u00a0<\/p>\n<p><strong>Conclusion<\/strong><br \/>\u00a0 \u00a0 In conclusion, as our world comes online, we must keep our society up to date as well. By regulating security policies, privacy legislation, and commercial activities, we can keep ourselves safe and our society working in unison with this new digital world. As Verbeek says, \u201c a blind and unregulated introduction of this technology and society would throw away the possibility of critical reflection and governance (Verbeek, 2014),\u201d \u00a0meaning instead of ignoring this growing world of technology, we must embrace it and stay ahead of the curve to protect our world.<\/p>\n<p><strong>References\u00a0<\/strong><br \/>Verbeek, P.-P. (2014). Designing the public sphere: Information technologies and the politics of Mediation. The Onlife Manifesto, 217\u2013227. https:\/\/doi.org\/10.1007\/978-3-319-04093-6_21\u00a0<\/p>\n<\/div>\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Take Away<\/h2>\n\n\n<p>This course has many benefits and a great professor. Learning was made easy with interactive lessons and an enthusiastic teacher. Days were never boring, and I learned a lot about human behavior in cybersecurity and the way it influences a victim&#8217;s and an offender&#8217;s behavior. We researched breaches to better understand the way the history of cyber attacks has influenced our understanding of cybersecurity now. This class allowed me to explore other careers in the cybersecurity field. I started wanting to be an ethical hacker, but now I am exploring a career as a digital forensic examiner.\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society In this course, I explored the interdisciplinary connections between technology and cybersecurity, examining how technological advancements impact cultural, political, legal, ethical, and business domains. Key focus areas included how cyber technology creates opportunities for criminal behavior, the cultural influences on cybersecurity strategies, and how cyber systems introduce security concerns. I studied&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kerinadrum\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29822,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-json\/wp\/v2\/users\/29822"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":472,"href":"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-json\/wp\/v2\/pages\/133\/revisions\/472"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kerinadrum\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}