Andrew Friend | 05 April 2024 |
SOC Analysts and The Social Sciences
The principles of science are social sciences spanning 7 unique principles. These are Relativism, Objectivism, Determinism, Parsimony, Ethical Neutrality, Objectivity, and skepticism. Security Operations Center Analysts may use these sciences to contextualize the work they do. Relativism plays an important role in this contextualization by explaining that all things are related. The desire for security is shared no matter the size of the business. However, according to (Howard, 2023, p. 150), many medium-to-large commercial organizations either have their internal SOCs or contract the function to a third-party Managed Security Service Provider (MSSP). Relativism may be used here to understand that smaller organizations typically accept more risks due to the financial cost of operating a SOC whereas larger organizations would have the capital and resources to operate a SOC or at the least, contract out the security operations. We will extrapolate that SOC Analysts work within larger businesses.
Four CYSE 201S Concepts and SOC Analysts
Social Cybersecurity is a product of Cybersecurity fundamentals and the principles of the social sciences. It is a method by which SOC Analysts may better understand the impact of cyberspace on the physical world and provides us a way to develop metrics we may use to measure and illustrate the flow of information online. To illustrate this, SOC Analysts may monitor social influence and group manipulation to assist in identifying attack vectors [2]. Maslow’s Hierarchy of Needs illustrates the needs of SOC Analysts who are conducting work to keep businesses and people safe and secure. The 5 levels of the hierarchy are Physiological needs, Safety needs, Belongingness and love needs, Esteem needs, and Self-actualization. Self-actualization being the top of the hierarchy may look like the successful implementation of Intrusion Kill Chain Prevention tactics that the Analyst employs in the line of work. Media affects the work of SOC Analysts in the way their duties and responsibilities are presented to the consumer. Consumers or users of technology in this case may have a positive view of SOC Analysts as these people are typically presented in a positive light and are shown as protecting users from nefarious actors. Economic Theories may be used to understand how medium to large corporations using SOCs work within their economies. Rational Choice as an economic theory does well to explain that businesses make choices in their best interest [3]. They desire security and have the means to increase it by retaining Analysts to protect their business.
Concerning Marginalized Groups
The existence of the SOC Analyst job position may be examined through a societal lens. Typically, these positions will require some certificate of qualification or degree to be considered for. This education requires finances and time to achieve, two factors lower income and/or marginalized community members would inherently lack. This is not to say it is unachievable, but this explanation may be used to explain disparities in the labor force.
SOC Analysts and Society
SOCs manage incident response teams, design, manage, and distribute key learning points from purple team exercises, and manage the intelligence sharing program among other responsibilities. (Howard, 2023, p. 151) This effort is meant to keep the data and Personally Identifiable Information housed within organizations and businesses secure, thereby protecting users. Society benefits from the service of SOC Analysts in this way. Their work provides safer online environments and databases and allows the populace to utilize convenience services and social media more safely and securely.
Conclusion
As we progress into the digital age, the work of SOC Analysts is going to become ever more important. The platform for their work is set by Cybersecurity principles which are continually being better understood and defined in academia and business. Their work heavily influences the success of businesses and the privacy of individuals in cyberspace and it is important to make training and qualification for this work accessible to a wider swatch of the population. Prospective analysts benefit greatly from the concepts covered in CYSE 201S and they must understand their role in providing for safe online and offline spaces.
References:
[1] Howard, R. (2023). Cybersecurity First Principles (p. 150). John Wiley & Sons.
[2] 6 Integrating Social and Behavioral Sciences (SBS) Research to Enhance Security in Cyberspace.” National Academies of Sciences, Engineering, and Medicine. 2019. A Decadal Survey of the Social and Behavioral Sciences: A Research Agenda for Advancing Intelligence Analysis. Washington, DC: The National Academies Press. doi: 10.17226/25335
[3] https://canvas.odu.edu/courses/153108/files/33456837/download?download_frd=1
[4] Howard, R. (2023). Cybersecurity First Principles (p. 151). John Wiley & Sons.