Analytical Paper

https://docs.google.com/document/d/1_u6_8cLCnSs4jtp1iLv15En-nJCLGfRvkIwQLEsE4eo/edit?usp=sharing

Analytical Paper

Abstract

The aim of this analytical paper is to identify and evaluate the social meaning and impact of cybersecurity-related technical systems. By incorporating previous learnings and assignments, a carefully crafting concluding analysis will follow, tying the concepts together. Adopting an interdisciplinary approach, each aspect of the studies will be scrutinized to deepen comprehension and facilitate further understanding of the topic.

Keywords: social, technical, cybersecurity, understanding

In order to properly analyze the intersection between social elements and the technical world, we must discuss the foundation of the cyber world, implications of engineering systems, and the connection between relative social disciplines. The works of cybersecurity and cyber technology can be viewed through a variety of social lenses. 

Foundations

A framework is a set of standards/guidelines used to improve and evolve a cybersecurity infrastructure. It can be useful when rooting out cyber risks and finding the ways to create new safeguards and security measures.  Following a framework helps organizations stay organized and find the weaknesses and vulnerabilities within their security systems. The stronger the infrastructure and security of a software/system, the less often and prone an organization will be to a breach (White and Sjelin, 2022). The five core activities of NIST are:

Identify  Identifying the vulnerabilities that are at risk within a security system, the weakest points of any security system are typically unauthorized users target

Protect  Finding the proper measures to safeguard and protect the system, this would include things like converting cleartext into ciphertext (encryption). Using encryption transforms laymen terms into code that is not understandable to the outside user, in hopes of attackers  being unable to decipher it.

Detect Continuous monitoring of the systems in place, detecting how efficient a system is function in regard to the security. Without detecting breaches and attacks, organizations would be losing information without knowing, giving them time to steal more and more.

Respond How a system attack is addressed and removed, for larger organizations we may find the importance of communicating with involved parties and stakeholders (even small system breaches should be communicated).

Recover The bounce back, this is where organizations take the time to rework and improve where the program had otherwise been weak. This is the opportunity for a system to come back stronger with those vulnerabilities patched and reworked.

Generating frameworks for cyber programs and networks can allow for a more cohesive communication system. By establishing standardized protocols and procedures, these frameworks enable parties to effectively communicate and collaborate across geographical and organizational boundaries. To lay the foundations for standards in cyber security research, a unified terminology is essential (Ramirez et.al., 2016). It may be argued that in order to appropriately advance in the technical world, we must continue to merge elements of social dynamics.

Engineering Systems

Cyber technology can have varying impacts on engineering systems. Cyber technology includes many elements such as cyber security, computer networking, IT, IS, and much more. That being said, these things travel into the realm of other relations. For example, we take cyber security and cyber relations into businesses and organizations, or even personal affairs. They elevate and provide advantage, if brought about properly. Even so, having ineffective cybertechnologies in place can hinder the progression of an engineering system. These systems require fluid foundations and frameworks in order to foster connectivity and collaboration. There is a heavy need for the proper technologies being paired with engine systems. For instance, any system must be functional, sustainable, and ever adapting to real-time change and upcoming challenges.

While cyber technology offers the potential for advancing and promoting engineering systems, its impacts are varying and complex. The outcome of certain systems does not guarantee success. However, if organizations/engineers take the time to perfect their cybertechnologies, there will be less technological setbacks and shortcomings. While it comes into play to protect and improve systems, cyber technology also poses new challenges and threats. One of the largest concerns is cybersecurity and its CIA/frameworks/foundations. Finding the balance and providing innovation with security is crucial for realizing the full potential of cyber technology in engineering systems. Engineering systems are constantly changing and adapting to current needs (Wang et. al., 2020). What if cyber technologies were being used to predict changes ahead of time so the necessary advancements and change could be made. Cyber technology and engineering systems have large impacts on each other. These needs can be physical, economical, social, etc.

Social Disciplines

As we explore social connections and intersections we can integrate numerous disciplines. For example—The connection between criminal justice and cybercrime is significant because traditional law enforcement needs to adapt to handle crimes that happen online, like hacking or fraud. This means police and courts have to learn new skills to deal with digital evidence and understand how cybercrimes work. While this is true, it can be costly and difficult to instill new practices and ensure they are in effect properly. As crimes and criminals change, the need for updated practices and training is required as well. This can tie into the disciplines of social science and psychology, as they deal in human behavior and crime motivators.

This overlap also involves other areas we’ve talked about, like cybersecurity and computer science. People in these fields work together with law enforcement to develop tools to prevent cybercrimes and figure out who’s behind them. Looking back at social science, we see how identifying motivating factors can provide leads and new insights. For example, cybersecurity experts help protect digital systems from attacks, while forensic scientists analyze digital evidence to catch cybercriminals. The questions are: Why do criminals attack? What are they attacking? How do we prevent these cyber crimes? 

Overall, the link between criminal justice and cybercrime shows how different fields need to work together to fight modern crimes happening in the digital world. Incorporating numerous interdisciplinary studies, we can gain insight into deeper thinking and new concepts that help make improvements. It’s about learning new skills, sharing knowledge, and using technology to keep up with criminals online and in the real world.

Conclusion

The intersection of social elements and the technical realm, particularly within the cyber world, is a multifaceted domain that requires comprehensive analysis across various disciplines. This paper has delved into the foundational aspects of cybersecurity infrastructure, emphasizing the importance of frameworks such as NIST’s core activities in bolstering security measures. By identifying vulnerabilities, protecting systems, detecting breaches, responding to attacks, and recovering from incidents, organizations can fortify their defenses and ensure resilience against cyber threats.

While cyber technology presents opportunities for advancement and efficiency, its efficacy is contingent upon proper implementation and integration within engineering frameworks and developments. More so, in a social regard, as traditional law enforcement adapts to combat online offenses, collaboration with fields such as cybersecurity, computer science, social science, and psychology becomes imperative. By utilizing interdisciplinary approaches, law enforcement agencies can increase their abilities in investigating and prosecuting cybercrimes, while also understanding the underlying motivations driving such activities. Ultimately, addressing the complex nature of the intersection of social elements and the technical world is led through collaborative efforts, ongoing education, and the adoption of innovative technologies. It is through this collective approach that we can forge a safer and more resilient cyber ecosystem for the future.

References

Wang, Z., Sun, L., & Zhu, H. (2020). Defining social engineering in cybersecurity. IEEE 

Access, 8, 85094-85115.

White, G. B., & Sjelin, N. (2022). The NIST cybersecurity framework. In Research 

Anthology on Business Aspects of Cybersecurity (pp. 39-55). IGI Global.

Ramirez, R., & Choucri, N. (2016). Improving interdisciplinary communication with 

standardized cyber security terminology: A literature review. IEEE Access, 4, 2216-2243.

Leave a Reply

Your email address will not be published. Required fields are marked *