Essential Work Habits – Technical Writing, Policy Evaluation, Linux
Technical Writing – CYSE 201S
Artifact #1 – Career Paper
Cybersecurity Auditor
The occupation in question is cybersecurity auditor. In order to protect corporations from millions of dollars in fines for noncompliance with regulations and standards, auditors in this field must get information and proof. Businesses can identify and address issues that could result in a costly violation of regulations, a data breach, or another major cybersecurity incident by conducting a cybersecurity audit. A cybersecurity audit identifies weak points, dangers, dangerous practices, and vulnerabilities in cybersecurity systems and procedures.
When trying to protect digital assets and extremely sensitive information across several businesses, cybersecurity auditors are essential all over the world. This career ties in really well with society and marginalized groups in so many different ways, as in discrimination and low digital literacy; certain groups may be more vulnerable to cyberthreats and privacy violations when their rights to privacy are protected. Cybersecurity auditors are essential in making sure that companies follow laws, industry standards, and privacy rules. Here, via defending their rights. They will lower the possibility of identity theft, threats, and illegal access to private information. These populations might not have access to safe online platforms where they could learn about cybersecurity and find other resources. By promoting best practices and certain security solutions, auditors can help bridge. Social justice and equity in these groups’ access to safe digital services are furthered by cybersecurity auditors. Cybercriminals frequently target marginalized communities for identity theft, financial frauds, and other crimes, and these auditors assist in fortifying these groups’ defenses against cyber dangers. Auditors assist in identifying and mitigating risks that could be used to attack marginalized groups, improving their digital safety and security, by carrying out risk assessments and security audits. Cybersecurity auditors have a big influence on marginalized communities because of their intersections with privacy, digital inequality, social justice, and ethical corporate practices.
A cybersecurity auditor must interact with people frequently; unlike most cybersecurity careers, this one requires much social skills. As was covered in class, many cybersecurity occupations require a strong understanding of human behavior in psychological and sociological contexts. It is crucial to this career because you will need to comprehend how different firms collaborate to accomplish tasks in order to better discover security issues and potential solutions. In this field of employment, standards and ethics are especially crucial because auditors depend on everything pertaining to technology and privacy to do their jobs well. They must also have excellent communication skills in order to ensure that everyone is aware of what has to be done to keep things secure. The next topic I’d like to discuss is surveys. This is only one of several research techniques that auditors employ to assess the security of different systems. Social science is frequently applied in this line of work.
In conclusion, cybersecurity auditors play a critical role in ensuring that businesses and organizations protect their computer systems from hackers. They look for areas where a hacker could enter a system covertly and steal data or cause other problems. By doing this, they ensure that no cyber disasters occur and that everyone’s sensitive information is kept safe. They act as something akin to the protectors of the digital realm, ensuring that everything is kept private and safe.
https://www.indusface.com/blog/what-is-cyber-security-audit-and-how-it-is-helpful-for-your-business/
Artifact #2 – Journal Entry
Some fake websites are very identifiable, while others are not. For example, fake websites may seem unreal, but most fake websites are designed to scam you, or simply clicking on the URL of the website can harm the device you are using. Starting with the URL of a website is a major way you can tell if a website is fake or not; for example, the URL would not contain “https.” Another red flag can be the design of a website; most poorly designed websites are scams. Websites that truly want you to spend your money with them will not just look bad because presentation matters. Always pay attention to the spelling and grammar on websites along with the reviews. My motto is if it does not have any reviews, do not buy it nor trust it.
Artifact #3- Article Review
Cybersecurity When Working From Home During COVID-19
Introduction
This particular research study goes in-depth on the impact and effectiveness of cybersecurity practices during COVID-19 from the lenses of remote workers. Remote work as we know it today has become the norm for millions of employees across the world. Whitty, Mustafa, and Grobler from this study discuss the challenges of maintaining safe cybersecurity practices while teleworking as it relates to cybersecurity technicalities and human behavior, bridging the gap between cybersecurity and social sciences.
Personal Thoughts
One of the critical questions that was discussed in the article was how employees learned and understood good cybersecurity practices during sudden lockdowns and how they were adopted at home. As I sat with this question, I began to wonder how it was for me personally when the world had suddenly changed. There had suddenly been a shift in responsibilities for students as well across all grade levels to use school-sponsored laptops and tablets. I began to reflect on the training that had been given to us prior to receiving the devices at the start of the school year. A responsible briefing of responsibilities and safe practices to combat security breaches should be the top priority of every organization. Remote workers should always be required to complete a mandatory training on the importance of cyber awareness and safe practices prior to being given credentials in order to prevent certain base-level issues.
Class Relation
The core of this research article discusses the human factor in the surveyed employees cyber security practices. It mentions how certain psychological and sociological factors have a significant impact on how well workers implement safe practices while working online. This is a great example as to how social sciences influences the technical aspect of cybersecurity. Especially since we are aware that an one size fits all approach does not equate well with the evolving field of cybersecurity.
Hypothesis
“We suggest that cyber educators and policymakers take a Vygotskian approach, which considers that social interaction is central to learning” (Whitty, Moustafa, & Grobler, 2024). This quote speaks to the theory that researchers have developed after gathering data from this particular study. This hypothesis also supports my personal thoughts from earlier in this writing. The evidence from the surveys show support as to why the assumption of secure online practices from employees without adequate preparation is counterproductive.
Research Method and Data
Researchers chose to survey a group of 27 individuals in Australia, a quantitative approach to gathering data. The participants’ occupations were diverse, being that workers ranged from age 25 to 72 and were employed in the fields of IT, education, public relations, sales, public services, consulting, food manufacturer, science, marketing, fundraising, solicitation, administration, travel, and financial planning. It is important to mention that all 27 employees had been working in-office prior to the pandemic.
Conclusion
This particular research article was an outstanding read. Researchers provided great detail at the intersection of social sciences and cybersecurity for remote workers during a historical period of time. After examining the article, readers of all demographics should come away with a new insight of how certain human factors influence employees and their production of safe, smart, and logical cyber security best practices.