Darian Church
Professor Diwakar Yalpi
Cybersecurity and Social Sciences 201S
17 November 2024
Security Architect
Security architects are people who are in charge of creating security systems to protect private or public networks. They have three main duties which is” designing and implementing secure systems, networks, and applications to protect (…) from cyber threats and attacks” (pg.1). Secondly, they build, maintain, and improve security networks and systems for different organization. Third, they conduct penetrative test and drills on their created systems to find any faults or weaknesses that can be dangerously exploited. In society, we need the security networks and systems to protect the information and privacy in our lives and organizations. Security architects tread on a certain path because of concern about human privacy, so they create systems that can protect while not going to far over those boundaries. When designing systems, security architects must also be aware of the diverse cultures that utilize their security platform and try not to respect their cultural differences.
Like in all job fields, there is a connection between their work in cybersecurity and the social sciences. Although, all social science principles relate to their work, they are a few that have key involvement. In security architecture the need for improvement of technology is great because as new attacks and infiltration into systems continues, people need to improve technology to defend them. In addition, the principle of ethical neutrality factors in because in this work a certain degree of research needs to be conducted to determine criminal mindsets
when doing cybercrime. This is why security architects need to be aware of current policies, so as not to impede on the on the rights and privacy of the those who use the network. In cybercrimes, marginalized group face challenges that can depend on their race, age, financial status, or location. Not getting enough feedback from targeted groups could lead to “security attacks that exploit some of these security vulnerabilities” in systems that don’t fix the bias (pg.1). Furthermore, certain barriers in communities like language and disabilities could become an obstacle for those looking to use these security benefits by making them to complicated. This can also affect people that don’t have secure phones, laptops, electronics that can’t access these security networks.
In system and network creation architect use human centered cybersecurity to look for human errors that can arise from the design, as well as the thought of cybercriminals that could try to infiltrate the systems. This also ties into human factors in cybersecurity because architect have to take into account the weakest link, omissions, and thought process that are used in creation to make sure the network is secure and ready before release. Research must also be done to get into the thought process and mindset of criminals who try to exploit the network. That is why study is put into the four psychological theories to account for objectives or reasons the criminal might try to attack the systems, before it happens. This is related to risk assessment because security architect needs to know the type of organization or systems, they are trying to protect to further predict the different people who would attempt to gain access.
In conclusion, security architecture is a job that closely ties into the social sciences. Architects need to tread careful because the outcome of the systems they make could lead to objection in society from crossing boundaries of rights and privacy. They also need to factor in the society needs from people who can not can not use these security networks freely because of bias or personal circumstances. Moreover, they need to carefully factor in the thought process of the criminals that make an effort to invade their networks.
Work Cited
“What Does a Security Architect Do?” CareerExplorer, CareerExplorer, 30 Apr. 2024, www.careerexplorer.com/careers/security-architect/.
Elrawy, Mohamed Faisal, et al. “Intrusion Detection Systems for IOT-based Smart Environments: A survey.” Journal of Cloud Computing, vol. 7, no. 1, Dec. 2018, https://doi.org/10.1186/s13677-018-0123-6.