{"id":392,"date":"2025-12-05T02:14:54","date_gmt":"2025-12-05T02:14:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/?page_id=392"},"modified":"2025-12-05T02:14:54","modified_gmt":"2025-12-05T02:14:54","slug":"professional-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/professional-paper\/","title":{"rendered":"Professional paper"},"content":{"rendered":"\n<p>Cybersecurity programmer<br>Student Name: Keeon Allen<br>School of Cybersecurity, Old Dominion University<br>CYSE 201S: Cybersecurity and the Social Sciences<br>Date: 11\/14\/2025<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Cybersecurity programming is a rapidly growing specialization within the cybersecurity<br>profession, focused on designing, building, and maintaining secure software systems that defend<br>against digital threats. As society becomes increasingly dependent on technology, cybersecurity<br>programmers play a vital role in ensuring the trust, safety, and functionality of digital<br>infrastructure. This paper examines the responsibilities of cybersecurity programmers through<br>the lens of social science principles, highlighting how human behavior, organizational structures,<br>and societal dynamics shape their work. It also connects key course concepts to the tasks<br>performed by cybersecurity programmers, discusses issues affecting marginalized groups in<br>relation to cybersecurity, and analyzes relevant scholarly research on cybersecurity careers.<br>Social science principles play a major role in cybersecurity programming because cyber<br>threats ultimately originate from human decisions, behaviors, and motivations. Understanding<br>why people create malware, exploit vulnerabilities, or fall victim to attacks helps programmers<br>build more secure systems. Motivations such as financial gain, curiosity, political activism, or<br>retaliation influence how threats are designed, which in turn shapes the defensive programming<br>strategies needed to counter them. Cybersecurity programmers rely on insights from psychology,<br>sociology, and human computer interaction when designing secure software. For example,<br>understanding why users choose weak passwords, disregarding warnings, or fall for phishing<br>attacks helps programmers create systems that reduce human error. Additionally, social science<br>research informs how cybersecurity training programs and awareness tools are built.<br>Programmers may use behavioral studies to design authentication methods users are more likely<br>to follow, develop phishing resistant interfaces, or incorporate behavioral economics into<br>systems that encourage safer digital habits.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Key cybersecurity and social science concepts include risk assessment, threat modeling,<br>confidentiality, integrity, availability, usability, and sociotechnical systems directly shape the<br>work of cybersecurity programmers. Programmers use these concepts to design secure software<br>architectures, evaluate vulnerabilities, and implement safeguards that reduce attack surfaces.<br>Threat modeling frameworks help programmers understand both technical risks and the human<br>factors that could enable an attack. Legal and ethical requirements such as HIPAA, GDPR, or<br>federal security standards guide how programmers handle sensitive data and implement system<br>protections. Concepts like security culture and human factors engineering influence how coding<br>practices are structured to reduce human error, enforce secure defaults, and ensure systems are<br>both usable and safe. Cybersecurity programmers apply these principles using tools such as<br>secure coding practices, vulnerability assessments, penetration testing, digital forensics,<br>encryption algorithms, and behavior-based detection systems. These techniques help them<br>identify weaknesses, interpret system behaviors, and create resilient software environments<br>capable of withstanding modern cyber threats.<br>Cybersecurity challenges often affect marginalized groups in unique and<br>disproportionate ways. Individuals with limited access to resources or digital literacy such as low<br>income communities, immigrants, or elderly populations are more vulnerable to scams.<br>Marginalized groups may also face increased surveillance, algorithmic bias, or exploitation<br>through insecure technologies. Cybersecurity programmers must consider these inequalities<br>when designing systems, ensuring that security protections do not leave vulnerable communities<br>at a disadvantage Equitable access to secure technology helps ensure that all individuals benefit<br>from the same level of protection and privacy in the digital world.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Cybersecurity programmers play an essential role in supporting the safety and stability of<br>modern society. Their work safeguards critical systems, including healthcare networks, financial<br>institutions, transportation infrastructure, and government databases. By building secure software<br>and preventing cyberattacks, they help ensure that essential services remain functional and<br>trustworthy. Public policies such as data breach notification laws, privacy regulations,<br>cybersecurity frameworks, and national security directives shape the responsibilities of<br>cybersecurity programmers. These policies guide how risks must be evaluated, how security<br>measures should be implemented, and how incidents must be reported. Understanding the<br>societal impact of these policies helps programmers create systems that balance technical<br>security requirements with ethical, legal, and human centered considerations.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Scholarly Journal Articles<br>Hadnagy, C., &amp; Fincher, M. (2015). \u201cSocial Engineering: The Art of Human Hacking.\u201d<br>Although broader in scope, the research emphasizes how psychological manipulation enables<br>security breaches. It supports the analysis of social science principles\u2014especially user behavior,<br>social engineering, and human-computer interaction.<br>Maalem Lahcen, R. A., Caulkins, B., &amp; Mohapatra, R. (2020). Review and insight on the<br>behavioral aspects of cybersecurity. Cybersecurity, 3(1), Article 10.<br>https:\/\/doi.org\/10.1186\/s42400-020-00050-w<br>Alm (or \u201cIntl.\u201d) Journal of Information Security (2025). Human factors in cybersecurity: An<br>interdisciplinary review and framework proposal. International Journal of Information Security,<br>24, Article 119. https:\/\/doi.org\/10.1007\/s10207-025-01032-<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity programmerStudent Name: Keeon AllenSchool of Cybersecurity, Old Dominion UniversityCYSE 201S: Cybersecurity and the Social SciencesDate: 11\/14\/2025 Cybersecurity programming is a rapidly growing specialization within the cybersecurityprofession, focused on designing, building, and maintaining secure software systems that defendagainst digital threats. As society becomes increasingly dependent on technology, cybersecurityprogrammers play a vital role in ensuring the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/professional-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":31460,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages\/392"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/users\/31460"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/comments?post=392"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages\/392\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/pages\/392\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201teportfolio\/wp-json\/wp\/v2\/media?parent=392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}