IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

Students in this course have completed a number of activities including an reflection essay, weekly technology and cybersecurity journal,  and several quizzes and exams. Please include some of these artifacts on this page, particularly the reflection essay, explaining what you did and how these projects helped you engage with the outcomes listed above.

Be sure to remove this instructional language when you have completed updating content on this page.

ePortfolio Writing Samples: Reflecting on Cybersecurity Concepts

For my ePortfolio, I have selected three of my free-writes and discussion board posts to showcase my work from this course. Since these pieces are intended for public viewing, I revised them to ensure they are clear, professional, and free of grammatical errors. I also focused on improving readability and overall presentation so each post reflects my best effort and understanding of the material.

Introduction: NIST Cybersecurity Framework 1.1 vs 2.0 Analysis

This document provides a one-page synopsis of the key differences between the NIST Cybersecurity Framework (CSF) version 1.1 and version 2.0. It highlights the major updates made in the newer framework and explains why these changes were necessary as cybersecurity threats and organizational needs continue to evolve. In addition, the document includes my personal comments on why each update was important and how it improves the framework’s effectiveness in real-world use.

Introduction: Cybersecurity Department Placement Analysis

This document presents an analysis of where a new cybersecurity department should be positioned within a large publicly traded company. It evaluates the advantages and disadvantages of placing cybersecurity under Information Technology, Finance, Operations, or reporting directly to the CEO. The goal is to understand how each organizational structure impacts security effectiveness, communication, and overall business risk. After reviewing the analysis, a recommendation is provided in the form of a memo to the CEO, including a clear BLUF, supporting reasoning, and a final conclusion.