IT/CYSE 200T

Cybersecurity, Technology, and Society

Students in IT/CYSE 200T will explore how technology is related to cybersecurity from an interdisciplinary orientation.  Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains. The learning outcomes for this course are as follows:

  1. Describe how cyber technology creates opportunities for criminal behavior,
  2. Identify how cultural beliefs interact with technology to impact cybersecurity strategies,
  3. Understand and describe how the components, mechanisms, and functions of cyber systems produce security concerns,
  4. Discuss the impact that cyber technology has on individuals’ experiences with crime and victimization,
  5. Understand and describe ethical dilemmas, both intended and unintended, that cybersecurity efforts, produce for individuals, nations, societies, and the environment,
  6. Describe the costs and benefits of producing secure cyber technologies,
  7. Understand and describe the global nature of cybersecurity and the way that cybersecurity efforts have produced and inhibited global changes,
  8. Describe the role of cybersecurity in defining definitions of appropriate an inappropriate behavior,
  9. Describe how cybersecurity produces ideas of progress and modernism.

Course Material

#1 Discussion Board: The NIST Cybersecurity Framework – 1/22/23

Organizations can gain a variety of benefits from using a cybersecurity framework. A framework provides an organized and standardized approach to identifying and implementing security controls that protect an organization’s data and systems from cyber threats. It can help organizations create a comprehensive security plan that covers all aspects of their networks, applications, and systems. Additionally, it can provide organizations with guidance on how to protect their data, stay compliant with relevant regulations, and develop security policies and procedures. In a future workplace, I would use the cybersecurity framework to ensure the organization is taking all the necessary steps to protect its data and systems. I would use it to help evaluate the organization’s existing security policies and procedures to ensure they are up-to-date and sufficient. Additionally, I would use the framework to identify areas of potential vulnerability and recommend corrective measures, such as implementing additional security controls or increasing employee security awareness training. Finally, I would use the framework to monitor and document the organization’s security posture regularly to ensure it is meeting its security objectives.

#2 Discussion Board : Ethical Considerations of CRISPR Gene Editing

Looking at CRISPR gene editing has the potential to modify the genetic makeup of populations and their individuals, which to me raises questions about the right to autonomy and decision-making. Ethically Individuals should be able to make decisions on and about their genetic makeup and must be given the information needed to do so. Consent is a key ethical consideration for any medical procedure, and this is especially true for CRISPR gene editing. I believe that all individuals involved in gene editing research must provide informed consent before being a participant, and their consent must be based on full disclosure and a run down of all of the risks and benefits associated with the procedure.

The safety of gene editing is a major ethical issue I saw, as it has the potential to cause unintended and irreversible changes to the genetic code. It is essential that researchers make sure that the gene editing process is as safe and accurate as it can be, and that any potential risks are addressed as quickly as they arise. CRISPR gene editing has the potential to be used to create and change genetic differences between individuals or populations, which raises issues of equity and fairness. It is important to make sure that technology is not used to create or perpetuate societal inequalities or discrimination among society.

#3 Write-Up – SCADA Systems

BLUF
Supervisory Control and Data Acquisition (SCADA) systems are essential for ensuring the safe
monitoring and control of vital infrastructure systems, reducing the possibility of cyber-attacks by
recognizing unusual activity, restricting access, and shielding data with encryption.

Heading
The use of Supervisory Control and Data Acquisition (SCADA) technology is an essential
aspect of the successful management of critical infrastructure systems. This type of technology
is used to observe and regulate industrial operations, making sure that all components are
functioning correctly. Nevertheless, SCADA systems are subject to a range of cyberattacks and
other security issues, which can potentially disrupt the reliability of these systems.

Most vulnerabilities of SCADA systems come from there their reliance on outdated
technologies that have not been designed with security in mind. Numerous SCADA systems
were created many years ago and were not intended to be connected to the internet or other
networks but to be on one private network. This has meant that various of these systems don’t
include fundamental safety measures, such as encryption and or authentication, which are now
common in contemporary software.

Conclusion
SCADA systems are like the trusty guardians of critical infrastructure, but just like a cookie jar
left unguarded, they can be vulnerable to sneaky cyber-attacks and other security threats. To
foil these malicious actors, we must take a multifaceted approach to security that involves
upgrading ancient technologies, schooling employees and contractors on the art of safe cyber
practices, and putting in place the best network security practices known to humankind. By
taking these necessary steps, we can ensure that our critical infrastructure systems remain the
reliable backbone of modern society in the face of the ever-growing threat of cybercrime.

Analytical Paper

Future of Technology Ethics

Intro

The prevalence of technology in today’s world has opened the door to a great many advantages. With this comes the imbued accountability of establishing and utilizing technology in a manner that is beneficial to the public. Consequently, we will be looking into methods of cultivating ethical technology creation and application. We must remember to factor in the moral aspects of technology development, so we can guarantee that it is employed in a manner that does not bring about harm, but rather helps to improve humanity.

Ethical Means of Technology Advancement

The significance of ethical concerns in technology design cannot be overstated. Technology is becoming increasingly embedded in our everyday lives, so creators must contemplate the ethical implications of their innovations (Barbosa et al). A major ethical thought is a security. With the increase in data breaches and the exploitation of personal information, designers must make sure that user data is preserved and that privacy policies are unambiguous. Furthermore, designers must think about the possibility of their technology passing on biases and discrimination. For example, algorithms utilized in hiring or lending decisions may reflect the prejudices of their creators and propagate prevailing inequalities. Finally, designers must think about the potential unanticipated effects of their technology. For example, social media networks created to link people may inadvertently result in the circulation of false information and the division of society. In conclusion, ethical considerations must be at the core of technology design to make sure that technology aids society as a whole rather than promoting harm.

            The application of immoral technology has a noteworthy effect on both people in general and people. In certain occurrences, innovation has been utilized to deceive and control individuals, prompting negative outcomes. For example, in the Enron case, the organization utilized innovation to control money-related information, prompting the breakdown of the organization and causing huge monetary mischief to speculators (Winter et al). Additionally, innovation has been utilized to attack individuals’ security, which can have genuine outcomes for people. For instance, the utilization of spyware and different advancements can permit people to be observed without their information, prompting a violation of their security rights (Winter et al). The effect of immoral innovation reaches out past people to people in general. For instance, the utilization of innovation in weapons creation and fighting has prompted the improvement of progressively deadly and damaging weapons, causing noteworthy damage to individuals and the earth (Winter et al). In conclusion, the utilization of unethical technology has critical negative impacts on both people and society, and it is fundamental to guarantee that innovation is created and utilized ethically to keep away from such destructive outcomes.

Ethical Means of Gene Editing 

Gene editing has been a groundbreaking concept in genetics that can bring a lot of advantages to the world. By making particular changes to an organism’s genetic code (Tizard et al), it can be used to cure genetic diseases that have no other cure, like cystic fibrosis or Huntington’s disease. Furthermore, it can be employed to cultivate crops with more resistance to pests and illnesses, raising harvests and maybe even diminishing hunger. Additionally, gene editing can be employed to create novel medical treatments, such as tailored cancer therapies, by transforming the genes responsible for cancer growth. It is essential to be aware that there are also moral issues connected to gene editing, especially when it comes to human genetic alteration. Despite this, gene editing is still an encouraging technology with potential benefits for society.

            Gene alteration is a powerful tool that has the potential to revolutionize the field of medicine and agriculture. However, the utilization of gene alteration technology also raises ethical considerations, particularly regarding the possible risks associated with unintended outcomes of genetic manipulation. Consequently, there are numerous regulations and guidelines in place to make sure that gene alteration is done responsibly and ethically. According to M Montenegro de Wit, one of the leading governing figures in this area is the International Commission on the Regulation of Gene Editing, which was established in 2017. This agency strives to promote responsible gene alteration practices by guiding the moral, social, and legal implications of gene alteration. Additionally, there are a lot of regulations in place for scientists and scholars who are working with gene alteration technology. For instance, the National Institutes of Health has created guidelines for the use of human gene alteration, which require that any research involving gene alteration be subjected to a rigorous ethical review process. Similarly, the European Union has established directives for the use of gene alteration in agriculture, which require that any genetically modified organisms be subjected to a comprehensive risk assessment before they can be approved for use.

Ethical Means of workplace technology 

Organizations should be mindful of ethical principles when devising strategies to address workplace crime and technology misuse. Such principles involve honesty, integrity, and respect for individual privacy. Consequently, companies must install a zero-tolerance policy for workplace crime and technology misuse and provide regular training for employees on ethical behavior. Furthermore, employees should be made aware of the consequences of engaging in such activities, such as potential legal action, loss of employment, and damage to the organization’s reputation. Additionally, clear guidelines for reporting workplace crime and technology misuse, as well as procedures for investigating and addressing such incidents, ought to be established. By paying attention to ethical considerations, organizations can create a work environment that encourages honesty, integrity, and respect for individual privacy, while at the same time protecting the organization from the adverse effects of workplace crime and technology misuse.

            The rapid integration of technology in the professional environment has both positives and negatives. Of the positives, the enhanced capability it provides to forestall workplace crimes is noteworthy. Technologies like electronic access control systems, CCTV cameras, and biometric recognition processes (Byrne and Marx) make it easier for firms to beef up their security protocols. Electronic access control systems let organizations limit access to certain areas, helping to keep undesirables out. Video surveillance offers round-the-clock monitoring of the workplace, acting as a deterrent to potential wrongdoers. Biometric techniques such as fingerprint scanning and facial recognition prevent identity theft, a common form of workplace crime. However, technology can’t completely stop all types of workplace crime. It should be used in tandem with other security measures such as physical security, employee training, and background checks (Byrne and Marx). Additionally, personnel who have access to sensitive info or systems may misuse technology, making the organization more prone to cyber-attacks. For this reason, technology ought to be blended with traditional security protocols to successfully halt and disincentivize workplace crimes.

Conclusion 

The incorporation of moral principles into the design and use of technology is a must to ensure the preservation of users and their info, decrease the spread of bias and intolerance, and prevent the occurrence of undesired outcomes. Businesses must take critical steps to guarantee that their technology is developed and used with ethical considerations in mind. Neglecting to do so could result in serious repercussions that could harm the company, its staff, and the everyday person.