{"id":348,"date":"2025-12-06T02:05:42","date_gmt":"2025-12-06T02:05:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/?page_id=348"},"modified":"2025-12-06T02:17:41","modified_gmt":"2025-12-06T02:17:41","slug":"cybersecurity-professional-career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/cyse201s\/cybersecurity-professional-career-paper\/","title":{"rendered":"Cybersecurity Professional Career Paper"},"content":{"rendered":"\n<p>Mac Gantz<br>November 15, 2025<br>Beyond Firewalls: The Senior Network Architect as a Social Scientist<br>Introduction<br>In relation to the field of cybersecurity, the general public often gets a picture of a dry and<br>technical world of code, firewalls, and packet data. The job of a Senior Network Architect sounds<br>like the epitome of this technical know-how. A person who&#8217;s responsible for designing the elaborate<br>digital fortresses that shield our data. Well-known as being the backbone of cybersecurity, the<br>technical side of a Senior Network Architect&#8217;s job is not what makes them most effective, though.<br>The most able Senior Network Architects are, in practice, social scientists who get to grips with the<br>people who use, misuse, and are controlled by their creations. This paper is going to take a look at<br>how a Senior Network Architect\u2019s work is deeply rooted in social science, from the mindsets of<br>individuals to the intricate workings of groups, ethics and how their decisions can decimate entire<br>communities and even society at large.<br>Designing for Human Behavior: The Psychological Component<br>Well-known to be responsible for safeguarding digital systems, a Senior Network<br>Architect&#8217;s main job is to create a network that is secure and functional, and lots of people<br>assume that this is a purely technical process, leading to an impossibly perfect system that can<br>ignore any and all human issues.<br>Cybersecurity experts have always said that humans are the weakest link in the security<br>chain, yet a social science perspective flips this on its head: saying we&#8217;re the main users that any<br>system should be centered on, and requires them to take that into account.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Applying principles of cognitive psychology and behavioral science, professionals in this<br>field can learn to make rational, intuitive and effective decisions. A mindless technical approach to<br>password security would ask for a 30-character password that needs to be changed weekly, but this<br>policy completely disregards the issue of \u201ccognitive overload\u201d (Slovic, 1997). When users can\u2019t<br>remember those ridiculously hard passwords, they&#8217;ll start to do silly things, like write them down or<br>reuse them, completely undermining the very security of the system. A network architect can make<br>the user&#8217;s experience less demanding, yet still secure, when creating a system. Coming from this<br>viewpoint, a network architect doesn&#8217;t design a prison, but instead, creates a framework that nudges<br>people towards a safe and secure outcome without expecting superhuman precision.<br>As a job that&#8217;s more about human interaction than pure technical know-how, network<br>architecture is sociological in nature.<br>A network architect&#8217;s job is sociological, requiring them to navigate organizational<br>politics, build consensus among stakeholders, and translate technical risk into shared business<br>policy.<br>Network architects need to navigate the complexities of organizational politics, build<br>consensus among stakeholders and boil down technical jargon into comprehensible terms for non-<br>technical bosses. This is basically a combination of applied sociology and organizational theory.<br>They have to chart the social map of the company to see where power lies, who the influences are,<br>and what aren&#8217;t written rules.<br>They must decide the company&#8217;s \u201ctolerable level of risk\u201d, something that isn\u2019t just a<br>mathematical equation, but a cultural, financial and social discussion. The accounting department<br>wants speedier transactions, but the legal team wants stricter privacy and compliance. Well-known<br>as a people person, the architect&#8217;s job is to find a happy medium and get everyone to agree, then<br>make a compelling case for why security is good for the bottom line, and that requires empathy and<br>top-notch communication.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>The final network design isn\u2019t just a technical diagram, it\u2019s a real-world expression of how<br>the company operates, priorities and makes sacrifices.<br>Architecture as Policy: Societal and Ethical Impacts<br>Network architects are de facto policymakers, and their design decisions can be brutally<br>affecting people&#8217;s lives, and hit the most vulnerable groups the hardest.<br>When a Senior Network Architect at an organization is laying out the framework for a<br>network, the impact of their work isn&#8217;t limited to their company, it can affect the whole society.<br>Because in today&#8217;s interconnected world, the systems they design have huge consequences and hit<br>the people who need them the most the hardest. People who design the critical infrastructure we<br>use. Such as hospitals, power grids, and municipal services, are making decisions that can change<br>the course of people\u2019s lives, in real and devastating ways. According to Verizon (2024) a design<br>failure in any of these areas can be more than just a loss of data, it&#8217;s a widespread disruption of<br>services that causes a lot of emotional distress to the community and can even be deadly.<br>The architect&#8217;s duty to grapple with this issue is made clear when you look at the social<br>principles involved in designing digital networks. Marginalization in social circles is mirrored in<br>digital network design, so in laying out a complimentary public Wi-Fi network for a city, the<br>decisions made by the architect are very much a matter of ethics.<br>Deciding to demand a credit card for verification for instance would basically shut out the<br>people who don&#8217;t have access to banking services and are living on the streets, the ones who<br>probably need this service the most. The Acceptable Use Policy of the network gives the service<br>provider the right to gather and sell information on users, but this creates a situation where<br>surveillance targets the people who can least afford private internet access. The architects decisions<br>here aren&#8217;t neutral, they&#8217;re about deciding what kind of policies to have, and can either shore up or<br>knock down existing social injustices. Well-known as a type of public policy-maker, architects must<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>understand the ins and outs of social justice and fair treatment of all members of society (Ebo,<br>2021).<br>Conclusion<br>The job of a Senior Network Architect is fundamentally a mix of technical and social know-<br>how. Even if they\u2019re experts in routing, encryption and firewalls, the success of their work is down<br>to their ability to understand how people think and behave, and how they can create networks that<br>are logical for regular people. They need sociology to navigate the companies they\u2019re working for,<br>and a crystal-clear moral compass to weigh the impact of their designs on society. Most of what this<br>job entails isn\u2019t about hooking up gadgets. It\u2019s about overseeing the complex human interactions<br>that flow through the networks they\u2019re building, with a particular eye out for the people who might<br>get hurt.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>References<br>Ebo, B. (2021). The Digital Divide: How Technology Design Reinforces Inequality. University<br>Press.<br>Slovic, P. (1997). The perception of risk. In P. Slovic (Ed.), The Perception of Risk (pp. 219\u2013232).<br>Earthscan Publications.<br>Verizon. (2024). 2024 Data Breach Investigations Report. Verizon Enterprise Solutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mac GantzNovember 15, 2025Beyond Firewalls: The Senior Network Architect as a Social ScientistIntroductionIn relation to the field of cybersecurity, the general public often gets a picture of a dry andtechnical world of code, firewalls, and packet data. The job of a Senior Network Architect soundslike the epitome of this technical know-how. A person who&#8217;s responsible&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/cyse201s\/cybersecurity-professional-career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":30243,"featured_media":0,"parent":300,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/wp-json\/wp\/v2\/pages\/348"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/wp-json\/wp\/v2\/users\/30243"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/wp-json\/wp\/v2\/comments?post=348"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/wp-json\/wp\/v2\/pages\/348\/revisions"}],"predecessor-version":[{"id":350,"href":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/wp-json\/wp\/v2\/pages\/348\/revisions\/350"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/wp-json\/wp\/v2\/pages\/300"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyber-impact-mac\/wp-json\/wp\/v2\/media?parent=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}