This course addresses the social, political, legal, criminological, and economic dimensions of cybersecurity through a social science framework. Students are introduced to a human-factors approach to understanding cybersecurity threats. Attention is given to the social factors that contribute to cyber incidents and the political and legal mechanisms that are developed to control the behaviors of those who create risks and cybersecurity incidents. The class also explores how cybersecurity is studied by social scientists in various social science disciplines.
SOME JOURNAL ENTRIES:
Review the NICE Workforce Framework. Are there certain areas that you would want to focus your career on? Explain which areas would appeal the most to you and which would appeal the least. After reviewing the NICE Workforce Framework the most appealing area to me that I would like to focus my career on would be Securely Provision, Protect and Defend, and lastly this area would be something I would like later down the line in my career and that is Oversee and Govern. The other areas really have no interest in me but if there were offering me that position and nothing else I liked was available I will take it.
Explain how the principles of science relate to cybersecurity. The principles of science relate to cybersecurity by testing and experimentation because science involves testing hypotheses through experiments and simulations. In cybersecurity, this means testing security systems and protocols to identify weaknesses and vulnerabilities that could be exploited by attackers. Another one would be data analysis because science involves analyzing data to identify patterns and trends. In cybersecurity, this means analyzing network traffic, logs, and other data to identify signs of suspicious activity or potential attacks.
Visit PrivacyRights.org to see the types of publicly available information about data breaches. How might researchers use this information to study breaches? Researches can use this information to help them find what the cause could be with the data breaches. If there is a trend they find then it could help them figure out what could be the leading cause of the problem. It also helps out by knowing what the attackers are targeting and that could benefit other companies by putting stronger defenses on that type of data these attackers are targeting.