Jadon White
CYSE 201S
Career Paper
November 24th, 2024
While a big portion of the discussion around cybersecurity is technical, the social aspect is typically forgotten. Cybersecurity analysts are one such role in which social science plays a major role. Cybersecurity analysts handle an organization’s IT infrastructure and security, identifying threats to it and taking steps to mitigate such risks. Even though they spend most of their time executing and improving technical defenses, concepts like human behavior, group dynamics, and criminal activity come under social science umbrella with psychology, sociology, and criminology as the broader areas of interest. In this paper, we investigate the reliance of cybersecurity analysts on social science research as a means to increase their effectiveness, and how these principles work in favor of protecting marginalized groups and society at large.
Psychology
Psychology is used by cybersecurity analysts to counter the most familiar and frequent cybercrime attack called social engineering attacks. It utilizes devious human actions like phishing, pretexting, or impersonation to deceive individuals into disclosing sensitive information. Cybersecurity analysts can use their knowledge of cognitive biases, for instance, trust or urgency, and the fact that an attacker may be preemptively trying to exploit this bias in users to set down a security measure plan. This psychological insight also assists analysts in creating training programs for employees to understand how social engineering works so they can avoid falling into this trap, thereby minimizing the chance of a breach.
Sociology
Sociology is another aspect of the social science in cybersecurity. Cybersecurity analysts take sociological concepts to examine social structures in the organization and interaction between people and technology, as well with each other. Insider threats — cases where employees or contractors intentionally or inadvertently compromise security — for instance, can be understood from a group dynamics and organizational culture perspective. This knowledge is utilized by analysts to create policies that encourage safe behavior and deter insider threats. They might also think about how the different roles that people hold in a group or organization affect compliance with security and use those ideas to customize training and policies.
Criminology and Crime Prevention
Criminology assists in many aspects of cybersecurity, where the focus is more on cybercrime prevention and detection. Analysts can apply criminological theories around criminal behavior, meaning they understand the motivations and tradecraft of cybercriminals. Understanding that attackers may be motivated by financial gain or political ideology, for instance, allows analysts to determine how cyber threats can and should be prioritized. Insights into these motivations also help in designing better defenses and incident response plans. Furthermore, criminology can provide analysts with a better understanding of the social and situational dynamics in which cyberattacks unfold, thus enabling more accurate threat modelling around repeat incidents.
The Importance of Safeguarding Marginalized Groups
Cybersecurity analysts play an equally important role in defending marginalized communities from cyber violence. Cybercriminals target masked entire groups of our society as well (not just at the individual level, but collectively): the homeless population, people with mental disabilities or no computer skills, racist and xenophobic types of low-income communities, and LGBTQ+ communities. For example, they may be more susceptible to online harassment, identity theft, and exploitation. Social science research can help cybersecurity analysts identify these vulnerabilities and create more equitable security processes that cater to the needs of a specific population.
Additionally, by applying criminological and sociological principles, analysts can ensure that cybersecurity efforts do not inadvertently victimize these groups. For instance, the law on privacy or surveillance could be weaponized to crack down on vulnerable populations and incite violence against them. Cybersecurity analysts must manage the tightrope between maintaining security without trampling on civil liberties as well, taking care that those already marginalized are not surveilled or stigmatized.
Use of Major Principles
Cybersecurity analysts use concepts from class, like risk assessment or security policies, or threat modeling on a day-to-day basis. Analysts should not just determine the potential for a technical attack but also consider the social variables that could affect human behavior in risk assessment. For instance, being aware of the psychological nature of social engineering attacks enables an analyst to determine if this vector represents a risk.
Analysts should consider organizational culture, group dynamics and the potential for insider threats when developing security policies. Taking social aspects into consideration makes it possible for analysts to broaden the scope of policies, ensuring that they are effective and applicable, which means compliance among various social groups in an organization. In the same manner, threat modeling uses some aspects of criminology to forecast potential cybercrimes. By comprehending how cybercriminals work and what their motives, and actions are; analysts can prepare defenses in advance or identify holes within the system before being used to gain credibility.
Conclusion
Cybersecurity analysts perform a critical job in defending organizations from digital threats, and much of what they do is informed by social science. Civilian cybercrime can be better anticipated and prevented, by security measures designed to protect vulnerable groups from becoming victims, if cybersecurity analysts conceptualize the threat in terms of human behavior, group dynamics and criminal patterns. Psychology, sociology, and criminology intertwined with cybersecurity ensures that analysts are able to adapt to the changing nature of digital crime while limiting harm in society especially towards marginalized communities.
References
Chukkath, M. (2024). Book review: Christopher Hadnagy, Social Engineering: The Science of Human Hacking. Indian Journal of Public Administration, 70(3), 652–654
Cybersecurity and cyberwar: what everyone needs to know. (2015). Choice Reviews Online, 52(09), 52–4806. https://doi.org/10.5860/choice.188472
Kirwan, G., & Power, A. (2011). The Psychology of Cyber Crime. In Advances in digital crime, forensics, and cyber terrorism book series. https://doi.org/10.4018/978-1-61350-350-8
Witkowski, D., Jarrin, P., Benczik, S., & Emile Walker. (n.d.). Cybersecurity – the Human Factor. In Deloitte Consulting LLP. https://csrc.nist.gov/CSRC/media/Events/FISSEA-30th-Annual-Conference/documents/FISSEA2017_Witkowski_Benczik_Jarrin_Walker_Materials_Final.pdf