Career Paper

Vaimuyan Trawally

12/11/22

Introduction:

Cybersecurity, often known as IT (information technology) security, refers to the technique used to defend vital systems and sensitive data against cyberattacks (Moallem, 2021). It consists of a range of countermeasures that are especially made to deal with threats to networked applications and systems, whether they come from within or outside of an organization. Hodyr (2022) emphasizes the fact that cybersecurity is a broad field that includes a variety of subfields, including data governance, risk and compliance, mobile security and endpoint protection, incident response and digital forensics, penetration testing and intrusion detection, infrastructure and network security, and application security, among others. Because of this, there are many different career options available in the field, including those for CISOs (chief information security officers), security architects, cyber security engineers, malware analysts, penetration testers, computer forensic analysts, and application security engineers, among others. Additionally, because cybersecurity is such a diverse field, it draws on ideas from a number of other disciplines, including social science, to achieve its objective of safeguarding computer networks and systems from information loss, theft, and/or disclosure as well as from service misdirection or disruption.

Social science ideas are used in computer forensics:

A branch of research known as social science focuses on the cultural and social dimensions of human behavior. Economic, political, psychological, sociological, and cultural (or social) anthropological principles are included in it (Weber, 2022). On the other hand, a job in computer forensics involves with retrieving, looking into, looking over, and analyzing data found in digital devices, usually in connection with criminality. For describing, comprehending, and predicting changes in human behavior and results in terms of politics, culture, and society that are mediated by the internet. Creating social cyber infrastructures that make it easier for society’s fundamental characteristics to adapt to a cyber-mediated information environment that includes cyber-mediated dangers, impending or real social cyber threats, and changing cyber circumstances. Social science psychology methods are often used by computer forensic investigators to examine cybercriminal activities. This specifically entails locating and verifying those responsible for cybercrimes, as well as demonstrating or refuting their innocence.

Coclusion:

In the case of a cyberattack, the primary responsibility of computer forensics experts is to recover data and acquire digital evidence. They strive to restore stolen, altered, or destroyed, altered data. Computer forensics analysts, often known as forensic psychologists or criminal profilers, occasionally collaborate with law enforcement organizations to develop concise profiles of cybercriminals based on shared psychological qualities (Raval, 2020). They examine every aspect of the cybercriminals’ conduct in this environment, from psychological theories to legal issues.

References:

Raval, H. (2020). Artificial Intelligence Forensics, Machine Learning Forensics and digital forensics. Digital Forensics (4n6) Journal. https://doi.org/10.46293/4n6/2020.02.04.05 

Weber, K. (2022). Cybersecurity and ethical, social, and political considerations: When cybersecurity for all is not on the table. Humanities and Social Sciences Quarterly. https://doi.org/10.7862/rz.2022.hss.07

Hodyr, E. (2022). Cybersecurity of Nuclear Weapon Systems. Cybersecurity and Law6(2), 91–101. https://doi.org/10.35467/cal/146469 

Moallem, A. (2021). Cybersecurity Technologies Classification. Understanding Cybersecurity Technologies, 1–4. https://doi.org/10.1201/9781003038429-1 

Leave a Reply

Your email address will not be published. Required fields are marked *