Journal 9

While technical in nature, social cybersecurity differs from traditional cybersecurity. Traditional cybersecurity involves humans using technology to “hack” technology. The target is information systems. Social cybersecurity involves humans using technology to “hack” other humans. The targets are humans and the society that binds them. This twist on the traditional cyber paradigm is sometimes referred to as “cognitive hacking. ” While leveraging the cyber medium for mass delivery, this emerging information warfare leverages advances in targeted (or micro) marketing, psychology and persuasion, policy gaps at and between private and government institutions, and understanding of the social sciences to deploy coordinated information operations with strategic effect. The article also expresses the challenges of cybersecurity and the governments. When governments rely on hackers to disrupt government operations, it may be devastating to the country. Thus, the article recommends taking an interdisciplinary approach to combat these efforts. Also, the government should make legislation that promotes cybersecurity and educate the public about the risks of using other websites. Not only is prevention necessary, but the use of open source technology can bridge the cybersecurity gap. With open source technology, the government can use technology that is backed by the community and receive frequent updates, making sure that the technology will not disappear in a short time. Besides, the protection to the outside world, there needs to also be protection in the internal nature of the governments. In order to protect confidentiality, governments should not leak the classified information to the public, even if the crime is a concerning action. Another measure to take is to test and have people fall to cybersecurity scams, so they can learn to avoid or repeat the same mistakes in the real world. By making social cybersecurity into a more established form of cybersecurity, it helps to focus on other aspects, not only the technical nature of cybersecurity.

Leave a Reply

Your email address will not be published. Required fields are marked *