Mod 10 Entry

Watch this video.  As you watch the video, think about how the description of the cybersecurity analyst job relates to social behaviors.  Write a paragraph describing social themes that arise in the presentation.

As we learned from Module 10, the cybersecurity analyst job is related to social behaviors, such as continuing learning, communication, technical and social skill, civic duty, team player, and systemic thinker. As Nichole mentioned in the video, no matter the title, cybersecurity-related jobs are the first line of defense and monitoring and responding to incidents. So this is related to technical skills in social behaviors. She also described the cybersecurity job locations, remotely or in person. Communication and team player is related. Clear, effective communication is important in a cybersecurity job. In the cybersecurity team, being a great team player is significant as well, so each member of the team can help each other due to no one can know everything. As technology is developing very fast, if we take the cybersecurity job, we should continue to have to constantly be seeking out the latest information about security, network vulnerabilities, and the latest capabilities (Champion et al., 2014).

Read this and write a journal entry summarizing your response to the article on social cybersecurity. https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/

Throughout the article, the author mentioned the concept of social cybersecurity. Social cybersecurity involves humans using technology to impact other humans, which is different from traditional cybersecurity where humans use technology to hack technology systems. The author asked that all military leaders must understand this emerging discipline of social cybersecurity and how it impacts our force, nation, and values. Social cybersecurity changed the traditional national security strategy, such as geographic limitation, anonymity, and the lack of certain attribution of an attack. The most important changes are decentralization and physical presence not required. Decentralization described that all posted information is diverse and comes from different sources not just the uniform way of main media. But this decentralization method increases the risk of the growth of fake news and the difficulty level of censorship of posted content. In the end, the author suggested that we must develop a multidisciplinary approach to social cybersecurity and must build a relevant policy that enables social cybersecurity.