Journal 8

on

Prompt: After watching the video, write a journal entry about how you think the media influences our understanding about cybersecurity


Media massively influences the general public’s perception of cybersecurity and its related occupations. Outside of people who work in cybersecurity or related IT fields, popular media is likely where most people are exposed to cybersecurity concepts and those involved with it. As a result, most everyday people likely base many of their assumptions and knowledge about cybersecurity on depictions in popular media. In many ways, this can result in potentially problematic misconceptions. For instance, many scenes showcased in the video portrayed cybercriminals engaging in highly technical and often flashy attacks. While this happens in real life, prominently portraying such attacks may give people a false sense of security by giving them the impression that cyberattacks are only directed toward organizations and highly influential individuals. This can be a disservice to society because there is much cybercriminals can gain from exploiting everyday people using both technical and non-technical strategies. These attacks are likely not portrayed in media because they do not make good TV, so to speak.

Similarly, popular media gives the impression that one has to be a genius and constantly perform difficult feats to succeed in cybersecurity. This likely discourages many people who view themselves as lacking innate ability from pursuing a career in cybersecurity because they believe they are not cut out for it. However, in reality, cybersecurity can be learned and often involves many day-to-day activities that are crucial despite being mundane. Finally, popular media frequently depicts individuals who can create and implement comprehensive cybersecurity solutions and attacks by themselves. This is also an inaccurate view of cybersecurity because it has become such a complex and interdisciplinary field that it requires teams of diverse people to create successful cybersecurity implementations. 

Leave a Reply

Your email address will not be published. Required fields are marked *