Journals

Top 3 Careers within the Cybersecurity Space

Three careers in the cyber social science field I would consider are a Cybersecurity Analyst, Security Consultant, and an Incident Responder. All three of these careers mainly focus on mitigating risks and creating solution to potential threats by creating policies and security procedures in case of certain incidents were to occur. All while sharing this info among other organizations so that the best response can be perfectly developed to IT attacks. 

Principle of Determinism within Cybersecurity

I think the principle of determinism describes how human decision to benefit one another and detriment one another is inevitable when anything new is discovered. And when it comes to computer hacking, this principle is applied no differently to anything else. There will be those seeking to find loopholes and gaps within computer protection systems. This, in turn, allows for cybersecurity specialists to patch those weaknesses within their own online securities. 

Theories that Best Describe Cybercrime

I think the majority of cyber crime is based around the neutralization theory. There is a standard of objective morality and understanding that means having respect for yourself and those around you. With the internet into play, people have found a way to weaponize the anonymity aspect of the internet and fail to empathetic of how it may negatively affect an other, rationalizing that “I can do what I want as long as I don’t get caught” mindset. This is what I imagine to be the case for leakers and information gouging users online. 

Biggest Threats to Cybersecurity

I thought it was a well thought out perspective that would not cross the mind of the American public. With American society built upon individualism, people simply think that they must protect themselves, not having to worry about the liveliness of the strangers they connect with on a daily basis on the internet. However, what he said was true. Hackers would be less successful success when the general public is sharing information about how to keep safe and keeping each other informed of threats. 

How Researchers might Address the Social Aspects of Cybersecurity

1. Social Media seems to be talked about in a bad light these days with the borderline obsession of attention and likes coupled with the eroding reduction of attention span in the younger generations that use it. However, like most things, it can be a good with moderation as an actual way to keep up with close friends instead of a cash grab. 

2. Around the world, it is viewed very differently. Some places like China, I would say have less privacy than countries like Australia or South Korea. However, there are countries like Iraq that have less focus on data privacy because of the politics within the country demand for other pressing matters. 

How Economics plays a Role in Cybersecurity

Like any and all industries and as a society, we have valued monetary currency as a basis of value on how we view time, objects, effort, etc. This is the case with cybersecurity as well. Hackers, data analysts, and those in the tech world understand that data equals money. One could even argue that the industry of cybersecurity, or security in general, is a protection based service measured by the economic loss from attacks versus the economic loss of having to pay for protection.