Journal Entry-2

CYSE 201S

The principles of science relate to cybersecurity in many unique ways. The different principles of science include determinism, relativism, objectivity, parsimony, ethical neutrality, objectivity, and skepticism. The main ones I think relate to the cyber field are relativism, ethical neutrality, and objectivity. I think relativism is extremely related to cybersecurity and will be even more so related in years to come. Every single part of our life is seeming to become digitalized. Passwords, medical records, criminal history, resumes, and much more. Soon, there will not be many things that are not able to be accessed by the internet. This means, sooner rather than later, every single thing will need some form of cybersecurity to be present. With this in mind, ethical neutrality comes into play. If everything is going to be online, what is to prevent people to take advantage of that. When do things such as identity theft become a major concern. Many websites require you to enter your social security number, which is of course something of major sensitivity. Along with that, medical records, personal life information, job and schooling history, and much more is also stored online. If someone were to get ahold of these things for a single person, they could really take control of their entire life. Social media accounts can also be taken over, so with this society turning more and more remote, someone could go missing and no one would know. Someone else could do their job, use their bank accounts, social media accounts, host meetings, without ever having to show themselves (or any of their credentials) in real life. This goes into objectivity, since we need to be able to hold people accountable online similarly to how we hold them accountable in the real world. If somebody steals fifty thousand dollars’ worth of information online, they should be prosecuted as if they stole fifty thousand dollars from a bank. Stealing information or money online is the modern-day version of a robbery, and should be looked at in the same light, regardless of how it is actually executed.

Leave a Reply

Your email address will not be published. Required fields are marked *