{"id":56,"date":"2024-04-07T16:43:14","date_gmt":"2024-04-07T16:43:14","guid":{"rendered":"https:\/\/student.wp.odu.edu\/pgagn002\/?p=56"},"modified":"2024-04-21T21:31:13","modified_gmt":"2024-04-21T21:31:13","slug":"a-brief-showing-of-how-professionals-depend-on-social-science-research-principles","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/pgagn002\/2024\/04\/07\/a-brief-showing-of-how-professionals-depend-on-social-science-research-principles\/","title":{"rendered":"Career Paper: A brief showing of how professionals depend on social science research &amp; principles."},"content":{"rendered":"\n<p>By Phillip Gagnon<\/p>\n\n\n\n<p><strong>Introduction:<\/strong><\/p>\n\n\n\n<p>Facebook is among the leading fortune 500 companies that require top tier cyber defense. And with 3 billion people in 2024 being members worldwide, they must be ready for a range of varied attacks that seek to access their customer base or the company Meta itself. With a very public domain, securing a network may sound confusing, \u201cmost of the information its public\u201d is misleading in the true amount of information \u201cmined\u201d from uses that cyber criminals can use for malicious means.<\/p>\n\n\n\n<p><strong>One Strategy:<\/strong><\/p>\n\n\n\n<p>To maintain security the cyber team at Meta must remain up to date on new tactics and strategies and diversify their capabilities. One of the ways they test their security is to contract out to a \u201cRed Team\u201d or a group of legal ethical hackers to test their defenses (Capital Technology University, 2021). This red team will attempt to break into the network&#8217;s defenses. After their attacks, the red team will report their findings so that the cybersecurity professionals working for Meta can shore up their defenses. Then, after a while, attempt another attack when requested by the company. This is all to defend one facet for Meta; their Network Security.<\/p>\n\n\n\n<p><strong>Network Security:<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The role of a Network security specialist is to protect their company\u2019s network from any sort of unauthorized users, attacks, or theft. However, in working for a company their job expands beyond cyberspace and into the mind of the users on their network. Human Factors play a part in a networks cyber defense. Why? Because the easiest way to steal, break, or disrupt something in a secure area; is for someone to let you in. (Cisco, 2024).One advantage to have in this regard may be diversity in NetSec professionals. Diversity creates a melting pot of concepts and ideas that provide a strong foundation to build on. Allowing a robust infrastructure that can tolerate and endure rigorous testing. This is implemented just from everyone\u2019s varying experiences and ability to build off each other. This coupled with staying up to date on information regarding the latest threats and trends in the cyber domain can lead to a stronger defensive strategy.<\/p>\n\n\n\n<p><strong>Human Factors:<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>Human factors are the mistakes that your network&#8217;s users may make that can cause a breach. The way to protect against this is to fortify your users. The way this is done is by training your workforce; on what they need to know and what to be on the lookout for (Carpenter, 2024). This involves far more than just informing them of the correct procedures, it involves explaining some methods that the user may receive and why they may be targeted. It involves researching new, current, and past attacks to prepare your colleagues for when they receive that new phishing email or attacks that look harmless to the untrained eye. Due to the fast pace of cyber innovations cyber criminals are getting trickier in their techniques every day.<\/p>\n\n\n\n<p><strong>Conclusion:<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>For professionals in the network security field, social science plays a vast amount of their job. The biggest factor of that, being the preparation for human factor errors that are going to occur as a law of statistics as time and advancements are made.<a><\/a><\/p>\n\n\n\n<p><strong><u>References<\/u><\/strong><\/p>\n\n\n\n<p>Capital Technology University. (2021, August 27). <em>How facebook\u2019s expanded cybersecurity Red Team Efforts Go Far Beyond the Social Network: Capitol Technology University<\/em>. Washington D.C. &amp; Maryland Area | Capitol Technology University. https:\/\/www.captechu.edu\/blog\/how-facebooks-expanded-cybersecurity-red-team-efforts-go-far-beyond-social-network<\/p>\n\n\n\n<p>Cisco. (2024, February 13). <em>What is network security?. Cisco.<\/em>https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-network-security.html<\/p>\n\n\n\n<p>Carpenter, P. (2022, June 27<em>). Council post: Cybersecurity: What can we learn from the social sciences?.<\/em> Forbes. https:\/\/www.forbes.com\/sites\/forbesbusinesscouncil\/2022\/06\/24\/cybersecurity-what-can-we-learn-from-the-social-sciences\/?sh=27eeeda439f9<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Phillip Gagnon Introduction: Facebook is among the leading fortune 500 companies that require top tier cyber defense. And with 3 billion people in 2024 being members worldwide, they must be ready for a range of varied attacks that seek&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/pgagn002\/2024\/04\/07\/a-brief-showing-of-how-professionals-depend-on-social-science-research-principles\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28353,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[6,5],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts\/56"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/users\/28353"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts\/56\/revisions"}],"predecessor-version":[{"id":66,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/posts\/56\/revisions\/66"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/media?parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/categories?post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/pgagn002\/wp-json\/wp\/v2\/tags?post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}