Hailey Caram
Read the following and write a journal entry summarizing your response to the article on social cybersecurity: https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/
Having been in the field for five years now, I always knew there was a social aspect to cybersecurity but I never considered it have its own subdomain. Essentially, traditional cybersecurity focuses on protecting systems and data from breaches, whereas social cybersecurity is focused on the changing of human behaviors and societal beliefs behind the digital platforms. The authors of this article defines social cybersecurity and its implications on national defense, shifts in information warfare, tactics, and how the military should adjust.
I thought the concept of “cognitive hacking” was really interesting. We, as a society, are so quick to read something on social media and share it without fact checking any of the information. Adversaries know this and are able to influence beliefs and cause divide within societies, all without ever engaging in any acts of war.
The article also introduces the BEND forms of maneuver which describes how adversaries are able to manipulate information and the social network (Army University Press, 2019). This framework is
I also appreciate that the author calls for an multidisciplinary approach by blending cybersecurity with social sciences and policy reform. Utilizing this approach is crucial in defending against threats that are more than just exploiting technology. It ensures that the government and its people are aware and do not fall victim to social attacks that could be prevented.
Overall, the article made me think deeper about the landscape I work to defend every day. Everything I work for would be for nothing if I were not to consider the social aspects of cybersecurity.
References
Army University Press. (2019, March). Social cybersecurity an emerging national security requirement. https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/