Cybersecurity & The Principles Of Science

Cybersecurity is an applied science itself. However, looking at this science from a social science view, there are a couple that we adhere to relativism, objectivity, parsimony, empiricism, ethical neutrality, and determinism. Relativism connects and allows us to see the developmental changes with the technology today. Also, how society is advancing and adapting to these advancements. Objectivity often requires a sense of opinionated judgment but these can’t shape the overall conclusion of particular cyber behavior. This is needed when addressing a cyber issue. Self-control is explored through parsimony which, cybercrime is a connection to this theory. When it comes to simplicity, it’s not easy to simplify the reasoning why people commit these mischievous acts since this is a part of parisomy. Through ethical neutrality, this takes reflection or concern about how we use technology for other purposes besides the internet. Today artificial intelligence is a common, ethical concern. Is it useful or harmful? Last but not least, to figure out the cause of these behaviors, determinism is applied. However, with computer usage, there is a certain motive with this whether it’s good or bad. With determinism, we have the option to engage with certain online activities or not to engage at all. All of these principles relate to cybersecurity because it’s used as an aid in identifying the behaviors of people on the internet and in the workforce. This can also explain the nature of human activity in the digital world and is useful for creating policies. 

NICE & The Workforce

Choosing to be a pen tester or cryptographer consists of critical thinking to see what is going on within the network or networks. Some areas that may be suitable and that I would want to focus on with these careers are analyzing, investigating, collecting, and operating. I can also see a bit of protection and defense. Cryptography encounters encrypting or cracking codes, which this career takes good analyzing. One, this involves thinking to see which method would work best to decrypt a message. Two, to see which language to use. The same goes for pen testing; it can go both ways as being a red team or blue team teammate. With investigating, I would have to notice the smallest things within the network and if everything is still intact. Collect and operate is important because it’ll be needed to see what method worked or what needs to be updated. Last but not least, both careers have to protect and defend the networks from hackers.

With overseeing and governing, I can’t see myself in that area. It requires responsibility to keep up with everyone and everything. Even in critical situations or attacks, at that moment, you have to assign right on the spot. Another area is operating and maintenance,  it’s almost the same as the previous area, except everything has to run proficiently for the devices to work or come up with solutions for it to be stable. These two mainly involve responsibility and I have to learn everything to keep the network and company running and protected.