Instruction: Explain how the principles of science relate to cybersecurity
Relativism
Relativism states that everything is related. However, for cybersecurity, as technology’s development continues, people’s lives are affected. It can be a good or bad thing, but it can be neither. Technology can impact a person’s life in many ways, socially, emotionally, physically, and more. In other words, the development of technology changes a person’s daily life.
Objectivity
Objectivity states that internal factors should not affect a person’s judgment. Internal factors are feelings or emotions that can change a person’s decision. Objectivity wants decisions based on the object and nothing else. For example, if a hacker hacked a system, what should their punishment be? If we consider a teenage hacker vs. an adult hacker, there’s a different punishment for both. Objectivism doesn’t allow any exception to the rule; if a person hacked an infrastructure, they should be punished.
Parsimony
Parsimony wants things to be simple. It is an excellent thought to keep things so that non-researchers or people unrelated to the field can explain certain events. For example, hackers want to hack for money, entertainment, and admiration. Parsimony would approve of the sample. Anyone can understand. However, parsimony can’t know a deeper understanding of why the decision was made. The human brain is complex, so there’s no easy solution to why things work. Parsimony wouldn’t understand why hackers hack. It simply knows their motives.
Empiricism
Empiricism wants scientists to make observations based on the human senses. Empiricism would know why a hacker might hack but won’t understand why it made a decision. For example, a hacker hacks for monetary gain because he needs money to pay off bills and food. Empiricism would only research things they can see, hear, or touch. It’s like What You See Is What You Get, nothing more.
Ethical Neutrality
Scientists should follow ethical standards when conducting research. Ethics is what is considered morally right and wrong. For example, a person being observed might have some things they do not want to share, but it can be a key to the research. The researchers will respect their decision if they do not want to share. In cybersecurity, on what level should a business keep its customer’s information? Is it ethically correct to gather information on people?
Determinism
Determinism states that human activity is predetermined. In cybersecurity, if the infrastructure is not secured, it is bound to be hacked. Any overlooked risks can lead to chaos in a business. Vulnerabilities that are not fixed or mitigated are bound for an intruder agent to pry on. Hackers do things for their self-interest. With low-self control, they target less secure infrastructure. Additionally, it is good to have a deterministic view because it would help create a plan for any breach or unforeseen disaster.