{"id":133,"date":"2025-09-18T23:15:37","date_gmt":"2025-09-18T23:15:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-12-10T03:26:19","modified_gmt":"2025-12-10T03:26:19","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ku\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p style=\"font-weight: 400\">This class has taught me cybersecurity in many different areas. I have learned about cybersecurity from an interdisciplinary view, which means looking at it through subjects like business, technology, criminal justice, sociology, psychology, and philosophy. I have also learned how cybersecurity issues connect to culture, politics, laws, ethics, and business. The class teaches how technology can be used for crime and how cybercrime affects people. In addition, I have learned to think more outside the box when it comes to cybersecurity. Overall, this course helps me understand how cybersecurity connects to modern life.<\/p>\n<h1>Course Material<\/h1>\n<p style=\"font-weight: 400\">Write Up: Hacking Humans<\/p>\n<p style=\"font-weight: 400\">The article\u00a0<em>Hacking Humans: Protecting Our DNA from Cybercriminals<\/em>\u00a0talks about how DNA is the most personal kind of information we have. The author calls it the\u00a0ultimate PII, which means personally identifying information. This is because your DNA is one of a kind and can\u2019t ever be changed. For example, if your debit card number gets stolen, you can replace it, but you can\u2019t replace your DNA.<\/p>\n<p style=\"font-weight: 400\">The article explains that many people use DNA testing services to learn about their family or health. However, once your DNA is digitized and stored online, hackers could try to steal it. If that happens, they could sell it on the dark web or use it in ways that could harm you. That\u2019s why DNA is so valuable and dangerous if it falls into the wrong hands.<\/p>\n<p style=\"font-weight: 400\">The author also says we don\u2019t always know what companies do with our DNA data. The company might use the DNA for research, sell it to other groups, or even share it with police to help solve crimes. That can be good in some ways, but it\u2019s also scary because people might not realize they gave permission for all that.<\/p>\n<p style=\"font-weight: 400\">The main point is that we need to be careful with our DNA data. Companies that collect it should have strong security to keep it safe. Our DNA is part of who we are, and once it\u2019s out there, we can\u2019t take it back. In the end, it\u2019s better to be safe than sorry when it comes to something as personal as your genetic information.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400\">Write-Up: The CIA Triad<\/p>\n<p style=\"font-weight: 400\">The<strong>\u00a0<\/strong>CIA Triad\u00a0is important in cybersecurity. The CIA stands for\u00a0Confidentiality, Integrity, and Availability. These three parts help keep information safe.\u00a0Confidentiality\u00a0means keeping private information so only the right people can see it. For example, using passwords help protect information from others.\u00a0Integrity\u00a0means keeping information correct and making sure no one changes it. This helps people trust that the data is real and accurate.\u00a0Availability\u00a0means making sure information and systems are always ready to use for the people who are allowed to access them. Backups and updates help keep systems working when something goes wrong. The CIA Triad helps make sure information is private, correct, and easy to access when needed.<\/p>\n<p style=\"font-weight: 400\">Two other important words in cybersecurity are authentication and authorization. Authentication\u00a0means checking who someone is.\u00a0Authorization decides what you can do once you\u2019re logged in. Therefore, authentication checks your identity and authorization gives you permission to do certain things. Both are important for keeping information safe.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: 400\">Write Up &#8211; The Human Factor in Cybersecurity<\/p>\n<p style=\"font-weight: 400\">If I was the CISO and only had a small budget, I would spend money on both training people and getting some basic cybersecurity tools. I would probably put more into training because people make mistakes all the time. Teaching everyone how to spot phishing emails, create strong passwords, and avoid risky behavior online can prevent a lot of problems without spending a ton of money.<\/p>\n<p style=\"font-weight: 400\">I would still get some important items like firewalls and antivirus to catch things people might miss. Basically, I would try to make sure everyone knows what they\u2019re doing and still have the tools to help protect us. That way, we\u2019re as safe as we can be without spending too much money.<\/p>\n<p style=\"font-weight: 400\">This is really important because one small mistake can cause big problems, so having both smart people and the right tools keep the whole system safe.<\/p>\n<p>&nbsp;<\/p>\n<p class=\"p1\">\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society This class has taught me cybersecurity in many different areas. I have learned about cybersecurity from an interdisciplinary view, which means looking at it through subjects like business, technology, criminal justice, sociology, psychology, and philosophy. I have also learned how cybersecurity issues connect to culture, politics, laws, ethics, and business. The&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ku\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30364,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ku\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ku\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ku\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ku\/wp-json\/wp\/v2\/users\/30364"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ku\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ku\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":291,"href":"https:\/\/sites.wp.odu.edu\/ku\/wp-json\/wp\/v2\/pages\/133\/revisions\/291"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ku\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}