Career Professional Paper
Rahil Patel
CYSE201S
Dr Brian Payne
Career Professional Paper
Cyber Security Engineer
Abstract
Social sciences are an integral part of cyber security. Social sciences used widely in cyber security. Cyber security is not possible without the help of social sciences because cyber professionals use the social science research methods. In the modern world, humans are now heavily dependent on internet to get their required work done. It could be using internet for entertainment, home automation devices, and smart devices. Therefore, the need of the cyber security is must to ensure the secure communication of devices. A designated skilled cyber professional, who will protect the system, make the online environment safe, is known as a cyber security engineer.
Key words: Internet – E-commerce – Malwares
Introduction
Cyber security is an emerging field from the technological changes. Cyber security engineers are cyber professionals who are actively working of protecting a network. They will try to look up for any vulnerabilities and threats of a network to eliminate a big event. As well, cyber engineers will implement their skills to ensure that they can be a step forward of hackers. Planning and implementing cyber skills are the priority of a cyber engineer. There can be two sides of cyber engineers as well. High skilled cyber engineer, who will be preventing systems from unauthorized access, are known as cyber defenders. Nonetheless, high skilled professionals, who will be looking to attack a system and steal information, are known as cyber hackers. Therefore, cyber security engineers play a very important role in human lives by enabling protection to devices, networks, and data.
Internet and E-Commerce
In the 21st century, most of the developed countries have adapted the evolution of internet happily. Nowadays, humans are using internet more than anything else. An individual can purchase required products, students can study from home, and employee can work remotely using the internet. We have discovered an example of Ann’s behavior during the class. Ann was a regular customer of a website www.shoppingcart.com, and Ann was using that website to buy the required products. Ann had all her personal information saved on the website including the phone number, address, and credit card information. Eventually, Ann received a coupon from shoppingcart.com in her email. Therefore, she tried to use the coupon and entered her bank account detail. Once she entered her bank information, a huge amount of money was wiped of from her account. Ann became a victim of phishing attack, and her information was taken by a hacker. The situation happened because she did not verify the email and trusted the website. There are so many attacks happen everyday because of lack of skills and awareness in the community.
Malwares
Cyber security engineers use the research methods of social science to ensure the protection. They are surveys, experiments, case studies, archival research, and field research. Surveys are used to get the feedback of internet users. Experiments will help to examine cyber behavior on virtual environments. Case studies will help prevent attacks that already happened in the past. Field research will enable the actual experience of the field. Archival research will help to study the data to prevent future attacks. Nonetheless, the lack of security allows a malware to enter a system. Malware is malicious script that is coded into a program to damage a system or take control of the system. Cyber offenders use social behaviors to enable malware scripts. Cyber offenders think critically to focus on the skills that a normal human like, so they can attract many individuals. As well, they will look for systems with more vulnerability to get an easy access to information (Bayuk, 2011).
Cyber security engineers are most active individuals of an organization. Their task is to keep the network problems away, and if a network breaks out happens, resolve the issue quickly. Sometimes, an organization may lose more money by staying offline. Engineers needs to keep testing systems for vulnerabilities and identify exploitable networks to prevent a damage. Engineers may require monitoring the inside network activity to ensure the inside environment will not become vulnerable. Moreover, keeping an eye on all system and network breaches will help engineers to create a stronger network. For many individuals’ cybercrime is a way to make money. Many individuals have made huge amount of money from cybercrimes, and it is a continuing story. Therefore, cyber engineer can become an obstacle in the way of cybercrimes (Aldawood, 2018).
The requirement of high skilled cyber security engineers has increased since a rapid use of internet around the globe. Therefore, it is providing more free hands to cyber offenders to deploy attacks because of lack of skills in the community. Nonetheless, if the awareness and skills can be spread in community, it will help reducing cybercrimes.
References
Aldawood, Hussain. “Educating and Raising Awareness on Cyber Security Social Engineering: A Literature Review.” IEEE Xplore, 4 Dec. 2018, ieeexplore.ieee.org/abstract/document/8615162.
Bayuk, Jennifer L., and Barry M. Horowitz. “An Architectural Systems Engineering Methodology for Addressing Cyber Security.” Wiley Online Library, John Wiley & Sons, Ltd, 16 Feb. 2011, onlinelibrary.wiley.com/doi/abs/10.1002/sys.20182.
F, Breda. “Social Engineering and Cyber Security – Researchgate.” SOCIAL ENGINEERING AND CYBER SECURITY, 15 Nov. 2019, www.researchgate.net/profile/Hugo-Barbosa/publication/315351300_SOCIAL_ENGINEERING_AND_CYBER_SECURITY/links/599c43430f7e9b892bafc0df/SOCIAL-ENGINEERING-AND-CYBER-SECURITY.pdf.
Moore, Michelle, et al. “Should You Become a Cybersecurity Engineer?” University of San Diego, 4 Aug. 2021, onlinedegrees.sandiego.edu/should-you-become-a-cyber-security-engineer/.