The Fault In Our Arguments

        In the Article “Why Computer Talents Become Computer Hackers” The Author’s focus on the the differentiating qualities of White, Black, and Grey Hat hackers and the psychological evidence that could have brought them to act in the manner in which they do. Enlightening as it may be, they focused on the six subjects in regards to how they started without looking at other motives which may have inspired other individuals. There is no doubt that said individuals could have experienced psychological damage developing to adulthood while simultaneously developing an interest in computers thus, creating a Black Hat hacker. However, throughout childhood we are lead to believe the world is a caring place and once the real world is reached, we conclude otherwise. The inspiration to seek knowledge in the act of computer hacking could’ve easily derived from other sources through, not childhood, but adulthood.

        Now we look at “”An Adaptive Threat Model for Security Ceremonies.” The argument residing within this article list that the “Threat Model” provided will allow practice in regards to ceremonies in security resulting in safer protocols to be made. This ensures that whoever practicing under this threat model in a cyber security profession will thus, be able to protect networks with better knowledge in the area of computer hacker techniques. I do agree that this scholarly article provides a feasible threat model that can allow individuals to practice and tune their skills. I do however argue the fact that even though it’s feasible for the time being will eventually, if not already, be out of date due to the never ending advancements made in technology and a computer hacker’s ability to adapt over time resulting in new techniques.
        The final argument is made in the article “The Cybersecurity Risk” The Author goes into explicit factual detail displaying the percentage of hackers and the amount needed for a company to spend in order to bring its total percentage of successful security breaches down to zero. The argument is supported by studies taken from a xx amount of Fortune 500 company and again, the amounts needed completely block all cyber attacks. It’s not devastating that a company would need to spend countless amounts of their proceeds to ensure security. I’m personally in full agreement of Simon’s article and do believe that at our current standing in technology, millions of dollars would need to be thrown in the direction of cyber security to ensure full protection.

Leave a comment