{"id":72,"date":"2023-12-06T23:46:28","date_gmt":"2023-12-06T23:46:28","guid":{"rendered":"https:\/\/student.wp.odu.edu\/mrobi038\/?p=72"},"modified":"2023-12-06T23:46:28","modified_gmt":"2023-12-06T23:46:28","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/mrobi038\/2023\/12\/06\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p><strong>Career Paper<\/strong><\/p>\n\n\n\n<p>Mason Robinson<\/p>\n\n\n\n<p>Department of Cybersecurity, Old Dominion University<\/p>\n\n\n\n<p>CYSE 201S: Cybersecurity &amp; Social Science<\/p>\n\n\n\n<p>Yalpi, Diwakar<\/p>\n\n\n\n<p>December 3, 2023<\/p>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>The role of digital forensics in the cybersecurity world is to locate, gather, and examine digital evidence usually from computer security occurrences to understand how it happens and how it can be potentially avoided in the future. Not only do digital forensics rely on digital evidence to investigate occurrences they also rely on social science research and social science principles to investigate occurrences. Using social science research and social science principles can make it easier for digital forensics to analyze and collect items of intrusion, for instance, malware and other software intrusions to have better cybersecurity for whoever was affected by a cyber-attack. (CISA)<\/p>\n\n\n\n<p><strong>Comprehending Human Behavior<\/strong><\/p>\n\n\n\n<p>Using social science research enables digital forensics to study and understand people\u2019s motivation, and behavior which is crucial for understanding how some cyber incidents may happen. The knowledge of the disciplines, for instance, criminology, psychology, and sociology, with these disciplines it can help digital forensics be able to recognize individuals\u2019 tendencies and motives when performing cybercrimes. Digital forensics would be able to use methods of investigation, identify certain trends, and be able to gather evidence accurately. They can use research from different disciplines to understand why a person may have committed a cyber crime or if they potentially might commit one, with this data future cyber incidents can be prevented.<\/p>\n\n\n\n<p><strong>Identifying the Principles<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; There are some principles that digital forensics can depend on to understand how cyber crimes are committed and how people get involved in them. One principle would be determinism, which means \u201cthat all outcomes are influenced or caused by preceding events\u201d (Moss 2022) with this information digital forensics professionals would be able to find the primary cause of the cyber incident and how every action was led up to the point of the incident. Not only would digital forensics professionals find the primary cause of the cyber incident, but they would also be able to formulate patterns that may occur and if this pattern is starting to be seen somewhere else, they would be able to prevent it. Empiricism is another principle that digital forensics can depend on, it \u201cmeans that as researchers, we should not rely on opinion or belief to draw conclusions.\u201d (Ross 2022) with this principle digital forensics can use detailed and specific evidence before concluding a cyber incident to make sure that all information is accurate when collected. One more principle that digital forensics would depend on is relativism which means \u201cthat all things are related and changes in one system can lead to changes in other systems\u201d (Found in Module 2) digital forensics can identify how certain changes lead to certain cyber incidents and information can be gathered to understand how these changes unfold.<\/p>\n\n\n\n<p><strong>Relation to Marginalized Groups<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The way that digital forensics can be related to marginalized groups is that digital forensics would be able to gain information on marginalized groups on how they could be affected by a cybercrime. For instance, there could be online harassment, digital forensics would be able to investigate this problem to understand why it\u2019s happening to the people of these marginalized groups and address these crimes. When it comes to more serious crimes against marginalized groups digital forensics would start to investigate these incidents and gather information to prevent these serious crimes from happening to marginalized groups that are being affected.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In conclusion, digital forensics significantly relies on social science research and social science principles to help further improve their investigation methods and help gather digital evidence from cyber incidents. With the integration of social science digital forensics can make sure that their investigations and information are detailed establishing a digital setting that is secure and protected for all users.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p><em>Browning, Katharine (2015) Social Science research on forensic Science: the story behind one of NIJ\u2019s newest research portfolios | National Institute of Justice<\/em>. (n.d.). National Institute of Justice. <a href=\"https:\/\/nij.ojp.gov\/topics\/articles\/social-science-research-forensic-science-story-behind-one-nijs-newest-research\">https:\/\/nij.ojp.gov\/topics\/articles\/social-science-research-forensic-science-story-behind-one-nijs-newest-research<\/a><\/p>\n\n\n\n<p><em>Understanding digital forensics: process, techniques, and tools<\/em>. (2023, October 27). BlueVoyant. <a href=\"https:\/\/www.bluevoyant.com\/knowledge-center\/understanding-digital-forensics-process-techniques-and-tools\">https:\/\/www.bluevoyant.com\/knowledge-center\/understanding-digital-forensics-process-techniques-and-tools<\/a><\/p>\n\n\n\n<p><em>Cyber Defense Forensics Analyst | CISA<\/em>. (n.d.). Cybersecurity and Infrastructure Security Agency CISA. <a href=\"https:\/\/www.cisa.gov\/careers\/work-rolescyber-defense-forensics-analyst\">https:\/\/www.cisa.gov\/careers\/work-rolescyber-defense-forensics-analyst<\/a><\/p>\n\n\n\n<p>Ryan Moss. (2022). Cybersecurity and Scientific Principles.&nbsp;<em>Ryan Moss<\/em>.&nbsp;<a href=\"https:\/\/sites.wp.odu.edu\/ryanmoss\/2022\/09\/14\/cybersecurity-and-scientific-principles\/#:~:text=In%20studying%20cybersecurity%20as%20a,%2C%20ethical%20neutrality%2C%20and%20determinism\">https:\/\/sites.wp.odu.edu\/ryanmoss\/2022\/09\/14\/cybersecurity-and-scientific-principles\/#:~:text=In%20studying%20cybersecurity%20as%20a,%2C%20ethical%20neutrality%2C%20and%20determinism<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Career Paper Mason Robinson Department of Cybersecurity, Old Dominion University CYSE 201S: Cybersecurity &amp; Social Science Yalpi, Diwakar December 3, 2023 Introduction &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The role of digital forensics in the cybersecurity world is to locate, gather, and examine digital evidence&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/mrobi038\/2023\/12\/06\/career-paper\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27447,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/mrobi038\/wp-json\/wp\/v2\/posts\/72"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/mrobi038\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/mrobi038\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mrobi038\/wp-json\/wp\/v2\/users\/27447"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mrobi038\/wp-json\/wp\/v2\/comments?post=72"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/mrobi038\/wp-json\/wp\/v2\/posts\/72\/revisions"}],"predecessor-version":[{"id":73,"href":"https:\/\/student.wp.odu.edu\/mrobi038\/wp-json\/wp\/v2\/posts\/72\/revisions\/73"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/mrobi038\/wp-json\/wp\/v2\/media?parent=72"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mrobi038\/wp-json\/wp\/v2\/categories?post=72"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/mrobi038\/wp-json\/wp\/v2\/tags?post=72"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}