What is the Impact of Cybersecurity on Society? (In Regards with the Core Themes of TOK)

The increasing reliance on technology makes cybersecurity one of the most crucial topics of the century. Cybersecurity has a vital role in ensuring that digital tasks go as intended. As a result of there being many individuals with harmful motives, cybersecurity engineers need to scrutinize every potential vulnerability. Furthermore, with the advancement of technologies in unprecedented rates, especially artificial intelligence, cybersecurity engineers are required to continuously plan out new strategies and be open to nuanced ideas. Speaking of ideas, being a knowledgeable individual is important in managing emergency situations, which is one of the tasks that cybersecurity engineers are responsible for regularly coping with. Accordingly, how could we associate the general role of cybersecurity on society with the core concepts of TOK? Well, core themes like scope, perspectives, methods & tools, and ethics are also indispensable for cybersecurity analysts.

To start with, the scope of a threat should not be undermined. For example, the infamous ILoveYou trojan initiated from a letter utilizing meticulously developed social-engineering. However, as the trojan took advantage of various companies’ infrastructural shortcomings, operations were thoroughly hindered. Ultimately, the damages done were of staggering numbers, which previously neither cybersecurity engineer nor analyst could have anticipated. As a result, numerous companies expanded the allocated budget for cybersecurity. These funds were used to recruit talented engineers, who were able to look at the threat of landscapes beyond the ill-defined limits. Granted, these engineers were able to account for the social impacts of cybersecurity attacks, while considering the structure of it. Due to the structure of the society, every role is interwoven within each other.  Furthermore, every role is undoubtedly in communication with each other, whether limited or continuous. Given that, no role is superficially independent from each other. Therefore, a vulnerability can have vast implications on the society, which can range from economic stagnation to corruption in harmony within the society. For instance, the paucity of security measures within a social media’s data processing system could result in a security breach once a flaw of it is discovered. Those with malevolent intentions could use the leaked data harass or even threat their victims, which is destined to evoke a sense of insecurity within their target.

Perspectives is a paramount topic in cybersecurity. Diverse perspectives could enable cybersecurity engineers to perceive beyond what their perspective offers. In fact, some vulnerabilities may pose risks more than others, when considered from socio-cultural standpoint. For example, some cultures may value private possessions, reminding its people that these types of properties cannot be used without the owner’s permission. On the other hand, some cultures may instead opt for public-use, ensuring that disparity among social classes doesn’t arise. The individuals who belong to the latter culture may intentionally share confidential information about the company, which can be considered as a security-risk. Moving on, artificial intelligence could be leveraged to employ a nuanced perspective regarding systematic flaws. However, since artificial intelligence is not a sensuous being, it might not attach that much importance to the social outcomes. Some cybersecurity attacks may aim to inhibit the expression of ideas of individuals with a set of perspectives. In fact, attacks may be used for as means of oppression, propaganda, and sensor.

Methods and tools are beneficial in developing new resolutions for potential attacks. Collaboration, a common tool, is highly encouraged in cybersecurity. Peers in a cybersecurity team could utilize collaboration to trade unique methods and tools with each other. However, these method and tools also should be refined regularly since with the enrollment of new updates, new vulnerabilities could occur. Furthermore, new methods and tools can be used to trick people into giving their confidential information. Phishing websites, which look identical to the authentic ones, are a rapidly-evolving issue in the field of cybersecurity. Moreover, if the phishing website offers exclusive advantages to the target (coupons, discounts, free gifts or products), the user gets even more enticed to click on the malicious link. In addition, as a result of the ever-evolving nature of social media, the issue is becoming more evident. As users in these platforms are less cautious in means of the private information they share (photos, biography etc.), more harmful-motived individuals have the opportunity to further investigate their target’s preferences. These individuals fabricate links, keeping in mind their target’s shortcomings and characteristics, in order to deceive their target for giving their personal data.

Lastly, ethics is the highest priority of cybersecurity. Accordingly, cybersecurity engineers and analyst undergo arduous work in order to preserve ethics. Since the user acknowledges that the platform will keep their information private upon signing up for it, the ones who process and transfer the data are responsible for all the consequences associated with it. Thus, if the platform experiences a data breech, those working in the field of cybersecurity would most likely be charged first. The platform also cannot legally get out of the case, as the user has the right to sue the accused platform for up to 750$. In fact, these numbers can increase, depending on whether the data breach resulted in financial or publicity/reputation loss for the user, which evidently occurs in the case of celebrities. To add up, the platform can be fined for up to 7500$ per victim. Since everyone with the compromised data is ethically responsible for the distribution of it, the bad actors can get a life sentence, especially in the case that it is used for disturbing and uncomforting purposes. Aside from that, the wandering of compromised data through social media has the potential to destruct the harmonious state of the society, through various disputes regarding the truth of the leaked information. Eventually, these arguments could arise tremendous chaos within these tempered people.

In conclusion, the role of cybersecurity on the society is something which can’t be dismissed. Without the strenuous efforts of cybersecurity engineers and analysts, the core values of the society would be impossible to conserve.

Bibliography

  1. How Does Cyber Security Affect Us? – VinciWorks [Online] https://vinciworks.com/blog/how-does-cyber-security-affect-us/ (Accessed 27/04/2025)
  2. Why is Cybersecurity Important? –  Upguard [Online] https://www.upguard.com/blog/cybersecurity-important (Accessed 27/04/2025)
  3. Why Cybersecurity is Important for a Modern-Day Society? – Institute of Data [Online] https://www.institutedata.com/blog/why-cyber-security-is-important-for-a-modern-day-society/ (Accessed 27/04/2025)
  4. What is Cybersecurity? – IBM [Online] https://www.ibm.com/think/topics/cybersecurity (Accessed 27/04/2025)
  5. What is Cybersecurity and Why is It Important? – Southern New Hampshire University [Online] https://www.snhu.edu/about-us/newsroom/stem/what-is-cyber-security (Accessed 27/04/2025)

Cemal Ediz Aksoy

Leave a Comment

Your email address will not be published. Required fields are marked *