{"id":436,"date":"2024-11-05T11:07:11","date_gmt":"2024-11-05T16:07:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaroncominio\/?p=436"},"modified":"2024-12-02T11:18:56","modified_gmt":"2024-12-02T16:18:56","slug":"week-10-journal-entry-11","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/05\/week-10-journal-entry-11\/","title":{"rendered":"Week 10: Journal Entry 11"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Beyond the Code: Social Behavior in Cybersecurity<\/h1>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"695\" src=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/AdobeStock_146447210-1200x814-1-1024x695.jpeg\" alt=\"\" class=\"wp-image-437\" srcset=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/AdobeStock_146447210-1200x814-1-1024x695.jpeg 1024w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/AdobeStock_146447210-1200x814-1-300x204.jpeg 300w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/AdobeStock_146447210-1200x814-1-768x521.jpeg 768w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/AdobeStock_146447210-1200x814-1-442x300.jpeg 442w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/11\/AdobeStock_146447210-1200x814-1.jpeg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-right has-cyan-bluish-gray-color has-text-color has-link-color wp-elements-49df9d314dded0a4a6f948a4539eef11\"><a href=\"https:\/\/www.dreamstime.com\/stock-illustration-man-woman-brain-gears-portrait-men-african-american-women-standing-back-to-back-near-blackboard-colorful-image91509561\" data-type=\"link\" data-id=\"https:\/\/www.dreamstime.com\/stock-illustration-man-woman-brain-gears-portrait-men-african-american-women-standing-back-to-back-near-blackboard-colorful-image91509561\">Denisismagilov<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Analyst<\/h2>\n\n\n\n<p>A cybersecurity analyst protects an organization\u2019s computer systems, networks, and data from security threats, unauthorized access, and cyberattacks. This involves monitoring, identifying, analyzing, and responding to security incidents. To be successful in this highly technical job, one must know social behaviors. Three responsibilities of a cybersecurity analyst that require an understanding of social behaviors are threat monitoring and detection, incident response and investigation, and user education and training. \u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Threat Monitoring and Detection<\/h2>\n\n\n\n<p>A cybersecurity analyst monitors networks and systems 24 hours a day, 7 days a week. Social engineering attacks are a significant cyber threat. By understanding human behaviors, analysts can better identify patterns to catch human-targeted attacks quickly. Threat detection systems can also be designed to recognize social behaviors that expose systems to social engineering attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Incident Response and Investigation<\/h2>\n\n\n\n<p>When a cyber incident occurs, analysts are there to respond. This response involves collaboration across the organization. Understanding social behavior equips cybersecurity analysts to handle incidents while preventing panic. Fostering a team approach to resolve incidents streamlines the response and recovery protocols.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">User Education and Training<\/h2>\n\n\n\n<p>Employee training is crucial for cybersecurity. The most effective training is provided by a cybersecurity analyst who understands social behavior. Knowledge of Human Factors will ensure that the training focuses on the interactions between\u00a0employees and technology. Familiarity with social behavior also guides the training format, limiting boring presentations that lack engagement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>A cybersecurity analyst\u2019s role requires more than technical expertise. Understanding social behavior significantly impacts an organization&#8217;s cyber safety. By applying social behavior insights, analysts will be better capable of detecting and identifying threats, responding to and investigating incidents, and educating and training employees. Ultimately, combining technical and social knowledge is crucial to be successful as a cybersecurity analyst.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beyond the Code: Social Behavior in Cybersecurity Denisismagilov Cybersecurity Analyst A cybersecurity analyst protects an organization\u2019s computer systems, networks, and data from security threats, unauthorized access, and cyberattacks. This involves monitoring, identifying, analyzing, and responding to security incidents. To be successful in this highly technical job, one must know social behaviors. Three responsibilities of a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/11\/05\/week-10-journal-entry-11\/\">Read More<\/a><\/div>\n","protected":false},"author":29612,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":1},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/436"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/users\/29612"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/comments?post=436"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/436\/revisions"}],"predecessor-version":[{"id":440,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/436\/revisions\/440"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/media?parent=436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/categories?post=436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/tags?post=436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}