How cybersecurity relates to principles of science

Jonathan Rice

Week 2 – Journal 2

            The principles of science can be applied to cybersecurity. The scientific method says that in order for something to be taken into understanding or acceptance, it must be logical, confirmable, repeatable, and scrutinized by peers or colleagues. It must be able to be described, explored, or explained according to the Social Science Research text. These principles can be applied to cybersecurity in the following ways. That the types of phishing or malware attacks, or breach identification, these things can be observed through the lens of scientific principles in that you may observe the attack, confirm that it was malicious and not erroneous. You apply the repeatable by trying to duplicate what happened in order to confirm that the breach or attack did occur. If you can repeat it, you bring in your peers or colleagues to review and see if they have the same conclusion as you did about the issue that occurred. Then you can explore what happened or how it happens, describe it to others, and then explain what happened and how you replicated. Further principles of scientific research include the hypothesis, observation, experimentation, and conclusion can also be applied to cybersecurity. You can try to determine ways the breach could occur if preventative, or how it did occur if forensic. You can design experiments to perform breaches or attacks if you are attempting to prevent malicious attacks, thus testing your own systems, and you can observe and conclude from your findings using logic.

Leave a Reply

Your email address will not be published. Required fields are marked *