{"id":141,"date":"2023-01-31T10:38:39","date_gmt":"2023-01-31T10:38:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2023-04-27T03:09:20","modified_gmt":"2023-04-27T03:09:20","slug":"cyse-200t","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/cyse-200t\/","title":{"rendered":"CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Students will explore how technology is related to cybersecurity from an interdisciplinary<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">orientation. Attention is given to the way that technologically-driven cybersecurity issues are<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">connected to cultural, political, legal, ethical, and business domains.<\/span><\/p>\n<p>The course objectives are:<\/p>\n<ul>\n<li><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">1.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Describe how cyber technology creates opportunities for criminal behavior.<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Identify how cultural beliefs interact with technology to impact cybersecurity strategies.<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">3.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Understand and describe how the components, mechanisms, and functions of cyber systems produce<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">security concerns.<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">4.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">victimization.<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">5.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">produce for individuals, nations, societies, and the environment.<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">6.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Describe the costs and benefits of producing secure cyber technologies.<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">7.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">have produced and inhibited global changes.<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">8.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Describe the role of cybersecurity in defining definitions of appropriate and inappropriate behavior.<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">9.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Describe how cybersecurity produces ideas of progress and modernism<\/span><\/li>\n<\/ul>\n<h1>Course Material<\/h1>\n<ol>\n<li class=\"p1\">Discussion board pertaining to NIST Framework: The NIST Cybersecurity Framework functions to provide a common language that can be used to understand, express, and manage cybersecurity risk. The five main functions of the framework are to: identify, protect, detect, respond and recover. With the determination of the different tiers a company would choose to implement, an organization can be prepared to protect their data, promote safe practices, defend against cyber attacks and even learn from past cyber activities. Depending on the size of an organization, implementing the NIST framework at a higher tier can provide the tools necessary to accurately assess risk and respond. The adaptation of policies and procedures to be followed by other employees is a good way to encourage an organization wide effort.<\/li>\n<li>Write UP: CIA Triad &#8211;\n<div class=\"Page-container\">\n<div id=\"page-0\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">\u201cWhat is the CIA Triad? Definition, Explanation, Examples\u201d Review<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This article discusses the CIA Triad; otherwise, known as the Confidentiality, Integrity,<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and availability triad, a template to direct practices and policies for information security within <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">organizations (Chai, 2022). The article gives definitions for the CIA terms, explanations of its <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">importance, examples, challenges that CIA may face, best practices for utilizing the CIA, and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">brief retelling of its history.<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Confidentiality<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Confidentiality deals with an organization\u2019s ability to keep sensitive information limited to <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">the appropriate and authorized party. There are multiple practices that authorized personnel and <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">organizations can take to maintain confidentiality of sensitive information. Authorized people <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">may receive specialized training to better understand risk factors and guard against them. This <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">training can include password-related practices, social engineering methods, uses of account <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and routing numbers for online banking. Data encryption, 2-factor authentication, and biometric <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">verification are also common practices for maintaining confidentiality. If the information is highly<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">sensitive, the authorized personnel may limit the information to an air-gapped computer, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">disconnected storage device, or hard-copy format. Organizations should handle their data <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">based on their required privacy and keep their control lists and file permissions updated.<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Integrity<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Integrity speaks on the credibility, accuracy, and consistency of data during its lifecycle. <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Data should not be altered during transit or by unauthorized persons. Organizations can <\/span><span style=\"font-size: 1rem\">maintain the integrity of their data by ensuring that their workers are educated about compliance <\/span><span style=\"font-size: 1rem\">requirements and utilizing recovery software, version, access, and security control, data logs, <\/span><span style=\"font-size: 1rem\">and checksums (Chai, 2022). These work to combat the challenges that may come about due to <\/span><span style=\"font-size: 1rem\">human error or non-human events, such as server crashes or electromagnetic pulses (EMPs).<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-1\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Availability<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Availability touches on the consistency and ease at which authorized personnel can<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">access their information. To ensure that information is readily available to authorized personnel, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">organizations need to continuously maintain\/upgrade their hardware and operating system <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">(OS), which can be monitored with network and server monitoring systems. In the worst case <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">scenario, in which data is at risk of being lost, organizations should have a redundant array of<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">independent disks (RAID) and a data recovery and business continuity (BC) plan (Chai, 2022).<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Conclusion<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">It is important to not view each part of the triad as individually exclusive entities but as<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">parts of a cohesive model that works to best maintain the privacy, quality,and readiness of <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">data\/information for its users. From 1976 onwards, the concepts of confidentiality (1976), <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">integrity (1987), and availability (1988) were slowly introduced and began to take form (Chai, <\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">2022). By 1998, these individual concepts were viewed to belong within a coexisting model.<\/span><\/p>\n<div class=\"endOfContent textLayer--absolute\"><span style=\"font-size: 1rem\">References<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Page-container\">\n<div id=\"page-2\" class=\"Page PageComponent\">\n<div class=\"Draw Draw--not-drawing Draw--selection\">\n<div class=\"TextLayer-container\">\n<div class=\"textLayer\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Chai, Wesley. \u201cWhat Is the CIA Triad? Definition, Explanation, Examples &#8211; Techtarget.\u201d<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">WhatIs.com<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">, TechTarget, 28 June 2022,<\/span><br class=\"textLayer--absolute\" role=\"presentation\"><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">https:\/\/www.techtarget.com\/whatis\/definition\/Confidentiality-integrity-and-availability-CIA?j=on.<\/span><\/div>\n<div>3. Discussion Board &#8211; Ethical Considerations on Gene Editing: There are definitely a few ethical considerations when talking about BioCybersecurity. DNA being contained in a digital database is dangerous as it is susceptible to being hacked, illegally acquired, and utilized in blackmail or for other criminal reasons. If DNA stays the same over time and can be used to identify culprits in cold cases, it could possibly be used in the reverse way. The articles also make a good point that it should be safeguarded more securely than social security information. The possibility that DNA could be used to hack computers is also a very present yet futuristic reality that we have to be prepared to face.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students will explore how technology is related to cybersecurity from an interdisciplinaryorientation. Attention is given to the way that technologically-driven cybersecurity issues areconnected to cultural, political, <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/khaleelgraham\/cyse-200t\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26113,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/users\/26113"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/pages\/141\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/khaleelgraham\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}