Module 10 Journal Entry 2

Social Cybersecurity is the title used in the article written by David M. Beskow and Kathleen M. Carley in March 2019. Despite this article being six years old, the content still holds true, if not has become more pertinent, and continues to grow more problematic. To understand why, social cybersecurity must be defined. According to the article, traditional cybersecurity involves humans using technology to “hack” technology. However, social cybersecurity involves humans using technology to “hack” other humans (Beskow and Carley). The most effective way to accomplish the task of “hacking humans” would be to control how they consume and perceive information, which brings us to our persistent issue: the spread of false information.

Misinformation and disinformation are tactics used to rewire the mind and create internal division among nations. It will take more than just cybersecurity experts to ensure that order and truth continue to prevail within a hectic cyber world. This is a large-scale effort that involves everyone, from technologists, educators, and policymakers, all the way down to the average citizen. Remember that cybersecurity has always been a human effort. How far we can continue to adapt and overcome obstacles, and understand social cybersecurity better, are examples of this. The moment an average citizen understands that the social media platform they are on is also used as a tool to collect their data and spread false information from opposing parties, we will be on the right track.

In summary, the issues discussed in the article are not theoretical but a reality that involves more than just Russian spies posting provocative content on your homepage. Social cybersecurity must become a national priority before the digital landscape becomes even more chaotic and our physical lives become more divided.

References

Beskow, David M., and Kathleen M. Carley. “Social Cybersecurity an Emerging National Security Requirement.” Army University Press, Mar. 2019, www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/Mar-Apr-2019/117-Cybersecurity/b/.

Leave a Reply

Your email address will not be published. Required fields are marked *