Avery Nance
4/24/2022
Analytic paper
Abstract
Right before our eyes we see technology evolving every day. Because technology is evolving every day, we are exposed to cyber-threats. In this paper, I will analyze the social meaning and impact of cybersecurity-related technical systems based on the response to technological advancements, human factors in cybersecurity, and workplace deviance. These topics contain facts and my stance on each aspect. By the end of this paper, you will understand cybersecurity’s impact on society.
As technology is on the rise every day, it has become a necessity to our lives. As much as it makes life easier, work comes with making sure it doesn’t negatively affect us as well. Cybersecurity is a work field where the main goal is to secure networks, software, businesses, markets, etc. While doing that a lot of components come into play. Trial and error has been beneficial to how we as a cybersecurity work force protect the cyber world. I feel that society has become vulnerable to the internet. People in society are becoming blinder to cybercrime. For example, there are millions of people that share their passwords to social media, streaming platforms, and more private platforms you wouldn’t believe. Throughout this paper, I will analyze how cybersecurity impacts society and how society is affected by technical systems.
Response to Technological Advancements
In our generation, technology is a necessity whether you enjoy it or not. We use technology in schools, hospitals, workplaces, etc. Our legislative bodies are what keep local communities, states, and the country as a whole on one page. To respond to the rapid technology advancements, I think the legislative branches should become more involved in the technology advancements. In our country we are looking to the branches as a guide so with them involving themselves we can stay ahead of the game. Another thing is that legislative official can contribute to strong conversations to identify digital gatekeepers. Officials can also propose regulatory guidelines for online infrastructure companies. If I could help I would require that all companies should be under the same software updates, programming systems and anything that needs to be updated as far as technology. Also, everyone will have a set technological system as they come out when things are advanced. I can hire employees that have the specific skill to manage modern technology projects. One thing that I think is lacking and I would do differently is train workers to have a fresh and updated way of working. Legislative branches typically have a certain age group. I can hire people that are receiving new information, procedure, technique to teach employees and that could allow them to have updated information on technology advancements and do their job in their branch how they should while keeping in mind the evolution of technology.
Human Factors in Cybersecurity
Human’s contribution to cyber threats tend to go unnoticed and we seem to give most credit to hackers. In a module, we were taught about multiple ways humans contribute to cyber threats. Although we have only went over two point of views, while reading the “security vulnerabilities” a few of those can be considered human contributions as well. For example, weak physical protection, weak passwords, antique devices, etc. Humans don’t realize how much of a factor they could be in avoiding cyber threats. Making a strong password is the difference in the protection of important medical records or even the security of an important figure in a company. Updating your devices can be a tricky one depending on the device. With technology evolving pros and cons increase. For example, hackers are more than likely to have the most up to date material to hack into devices limiting them to only being able to hack into devices that meet certain updated software. Therefore, some antique devices could be better because they don’t have the updates protection which is most likely based off recent technology.
Realizing that budgets are limited, you have to split how you would like to protect devices. If I had to choose, I would rather spend my budget on additional technology. As humans, naturally we tend to do what’s easier and for example what would be easier is making a password short & easy to remember. Tradeoffs of training take a lot more work and trust. When I say that I mean working with people to get them to understand the importance of security is a hit or miss because as I stated before as a human, what’s easier is what’s better. As far as trusting people to apply what they learned is another battle within itself. Investing in peoples trust is a gamble. If I were to invest into additional technology it would require you to have certain software and criterion for a password. One example is when making an account, majority of companies have a password policy a specific character and special character count and number requirement. I think that’s the best way to secure an account and additional technology is what I would invest in when securing my company.
Deviance in the cybersecurity workplace
Deviance is the state of departure from standards in social and sexual behavior. A common workplace deviance is through the internet. Workers that have gotten terminated, depending on how high up they are, can have enough information to destroy the company possible seeking money for the information. Not only that but if they aren’t yet locked out of the system they can continue to going harm to the company. That is a prime example of deviance because it is the opposite of being loyal to the company. Cyber technology has created bigger opportunity for workers to be most defiant because technology is so easy to create a cover up. The evolution of cyber technology has made it easy to be deviant and harder to get caught.
In conclusion, society has become vulnerable to technology. Social meaning for cybersecurity is in front of us every day and the cyber technologic impact is affective to the world. Throughout my analysis, I have shown how the society has had to adapt to technology, how they are a vulnerability to cybercrime and how society has played a part in cybercrime, positively or negatively. Although, society doesn’t know majority of ways to avoid cybercrime some way are imbedded into the society as well. For example, software updates 2-step authentication, etc. These way they are protecting their data are great start to gradually learning more.