{"id":133,"date":"2024-09-18T20:52:15","date_gmt":"2024-09-18T20:52:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-12-01T21:35:42","modified_gmt":"2024-12-01T21:35:42","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/swood\/it-cyse-200t-2\/","title":{"rendered":"IT\/CYSE 200T"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Cybersecurity, Technology, and Society<\/h1>\n<p>Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:<\/p>\n<ol>\n<li>Describe how cyber technology creates opportunities for criminal behavior,<\/li>\n<li>Identify how cultural beliefs interact with technology to impact cybersecurity strategies,<\/li>\n<li>Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,<\/li>\n<li>Discuss the impact that cyber technology has on individuals\u2019 experiences with crime and victimization,<\/li>\n<li>Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,<\/li>\n<li>Describe the costs and benefits of producing secure cyber technologies,<\/li>\n<li>Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,<\/li>\n<li>Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,<\/li>\n<li>Describe how cybersecurity produces ideas of progress and modernism.<\/li>\n<\/ol>\n<h1>Course Material<\/h1>\n<p>Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,\u00a0 and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.<\/p>\n\n\n<!--nextpage-->\n\n\n\n<h2 class=\"wp-block-heading\">Assignments<\/h2>\n\n\n\n<p>Below are some of the assignments that I&#8217;ve completed in CYSE 200T, particularly ones that have helped me better understand the course&#8217;s learning outcomes and cybersecurity as a whole.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Discussion Board: Protecting Availability<\/h2>\n\n\n\n<p>In this&nbsp;discussion board, you are the CISO for a publicly traded company. What protections would you implement to ensure availability of your systems (and why)?<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"874\" height=\"712\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/db1.png\" alt=\"\" class=\"wp-image-333\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/db1.png 874w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/db1-300x244.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/db1-768x626.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/db1-368x300.png 368w\" sizes=\"(max-width: 874px) 100vw, 874px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Write-Up: Exploring Attacks on Availability<\/h2>\n\n\n\n<p>In this assignment, you will&nbsp;research and analyze&nbsp;different types of cyberattacks that target the availability of systems, networks, or data, which is one of the core principles of cybersecurity. Known as &#8220;Attacks on Availability,&#8221; these are incidents where malicious actors attempt to disrupt access to critical resources, making them inaccessible to users. Such attacks can include Distributed Denial of Service (DDoS), ransomware, and other forms that focus on hindering legitimate access.<\/p>\n\n\n\n<p><strong>Objective:<\/strong>&nbsp;You are tasked with providing a concise,&nbsp;<strong>250-word<\/strong>&nbsp;summary of a specific attack on availability. Use recent online sources to explore how these attacks occur, their impact on organizations, and possible defenses. Be sure to cite at least one reputable source to support your analysis.<\/p>\n\n\n\n<p>In your response, address the following:<\/p>\n\n\n\n<ul>\n<li>Define what is meant by an &#8220;attack on availability.&#8221;<\/li>\n\n\n\n<li>Describe a recent example of such an attack or a common technique used in these attacks.<\/li>\n\n\n\n<li>Briefly discuss the broader implications of these attacks on organizations and users.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"411\" src=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wu1-1024x411.png\" alt=\"\" class=\"wp-image-334\" srcset=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wu1-1024x411.png 1024w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wu1-300x120.png 300w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wu1-768x308.png 768w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wu1-600x241.png 600w, https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/wu1.png 1296w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Write-Up: SCADA Systems<\/h2>\n\n\n\n<p>In this write-up you will use the&nbsp;SCADA Systems article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.<\/p>\n\n\n\n<p>This write-up is to be&nbsp;<strong>IN YOUR OWN WORDS,<\/strong>&nbsp;and must reference the aforementioned article, and at least one additional source of your choosing.<\/p>\n\n\n\n<p>Business writing skills apply and account for 50% of the final grade.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-CYSE20200T20-20SCADA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-CYSE20200T20-20SCADA.\"><\/object><a id=\"wp-block-file--media-9fbb1ce2-81a3-4ee3-97d6-8e0b3f3ced0d\" href=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-CYSE20200T20-20SCADA.pdf\">annotated-CYSE20200T20-20SCADA<\/a><a href=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-CYSE20200T20-20SCADA.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9fbb1ce2-81a3-4ee3-97d6-8e0b3f3ced0d\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Write-Up: The Human Factor in Cybersecurity<\/h2>\n\n\n\n<p>During this week&#8217;s reading, you&#8217;ve been exposed to different points of view regarding human contribution to cyber threats.\u00a0 Now, put on your Chief Information Security Officer hat.\u00a0 Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology?\u00a0 That is, how would you allocate your limited funds?\u00a0 Explain your reasoning.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-CYSE20200T20Human20Factors.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-CYSE20200T20Human20Factors.\"><\/object><a id=\"wp-block-file--media-be2d7288-1662-48d4-817c-2603d880a1dc\" href=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-CYSE20200T20Human20Factors.pdf\">annotated-CYSE20200T20Human20Factors<\/a><a href=\"https:\/\/sites.wp.odu.edu\/swood\/wp-content\/uploads\/sites\/37112\/2024\/12\/annotated-CYSE20200T20Human20Factors.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-be2d7288-1662-48d4-817c-2603d880a1dc\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity, Technology, and Society Students in\u00a0IT\/CYSE 200T\u00a0will explore how technology is related to cybersecurity from an interdisciplinary orientation.\u00a0 Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows: Describe how cyber technology creates opportunities for criminal&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/swood\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29383,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/users\/29383"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/pages\/133\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/swood\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}