{"id":356,"date":"2024-04-08T03:34:18","date_gmt":"2024-04-08T03:34:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/?p=356"},"modified":"2024-04-08T03:34:18","modified_gmt":"2024-04-08T03:34:18","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/2024\/04\/08\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Alexander Conrad<br>CYSE 201S<br>04\/07\/2024<br>Intro<br>Career Paper<br>Cybersecurity is the general umbrella term of a multitude of different jobs and careers<br>that specialize in different disciplines and ideas that are more specific than just the description of<br>the term. Cybersecurity as a term is to protect networks, devices, and data from any unauthorized<br>personnel. With the unending advancement of technology and inevitably more risks associated<br>with this technology, the growing number of jobs has increased and continued to increase every<br>year. Since Cybersecurity has so many different jobs it allows professionals of many different<br>disciplines to take these jobs with examples being computer science, law, and many others. In the<br>Cybersecurity field, almost all of them deal with social science ideas and principles, they use<br>them to further the development of cyber policies and law. The career I will be discussing today<br>is the Cyber Defense Forensics Analyst.<br>What is a Cyber Defense Forensic Analyst?<br>A Cyber Defense Forensic Analyst is a cybersecurity professional that, \u201canalyzes digital<br>evidence and investigates computer security incidents to derive useful information in support of<br>system\/network vulnerability mitigation.\u201d (Cisa.gov). Compared to other jobs in Cybersecurity<br>that deal with investigations or other illegal cyber activity, Cyber Forensic Analysts investigate<br>previously occurred incidents to learn the motivations of who committed it, how they were able<br>to get in, and what the main goal was. Similar to their non cyber related counterpart, these<br>forensic analyst\u2019s look at the crime that took place in order to get a better understanding of the<br>crime and how they can possibly find the perpetrator through the use of patterns of other events<br>taking place.<br>How a Cyber Defense Forensic Analyst requires and depends on social<br>science research and principles<br>Social science is a type of science specifically studied on society and how everyone in<br>society reacts or interact with one another. Anol Bhattacherjee describes social science as, \u201cthe<br>science of people or collections of people, such as groups, firms, societies, or economies, and<br>their individual or collective behaviors.\u201d (Bhattacherjee, A. 2012). Social sciences are typically<br>separated into two disciplines, psychology and sociology. When studying and researching using<br>the social sciences it allows the researcher to interact with a subject in a different way compared<br>to the normal physical sciences, in the such that it focuses more on the human social aspect.<br>Cyber Defense Forensic Analyst do exactly that and actually requires the social sciences in order<br>to do their job because when analyzing previous cyberspace crime scenes, they have to learn not<br>so much about the tools used in the crime, but rather the cybercriminal that committed the cyber<br>attack. When looking at the crime for the specific purpose of why a person did the crime, they<br>can put it together with other information they have gathered to create a framework and can use<br>this framework as a basis to better protect the company and internet in general in the future.<br>Cybersecurity experts in this job typically use a form of cybersecurity called social cybersecurity<br>which has the disciplines of social sciences and cybersecurity. \u201cSocial cybersecurity uses<br>computational social science techniques to identify, counter, and measure (or assess), the impact<br>of influence campaigns, and to identify and inoculate those at risk against such<br>campaigns\u2026These methods also provide scalable techniques for assessing and predicting the<br>impact of influence operations carried out through social media, and for securing social activity<br>on the internet and mitigating the effects of malicious and undue influence.\u201d (Carley, K 2020). In<br>addition to these methods, they use the principles and theories of social sciences when looking<br>for human factors of the cybercrime. These theories include Cognitive theories, Behavioral<br>theories and Personality theories which are used with the principles such as relativism,<br>objectivity, and parsimony for example to create criminal profiling for cyber attacks that have<br>happened before. A Cyber Forensic Analyst uses these theories and methods in order to<br>successfully learn and profile the individuals that commit these cyber attacks and protect the<br>companies and businesses more effectively.<br>How a Cyber Defense Forensic Analyst relates to marginalized groups<br>and society in general<br>Cyber Defense Forensic Analyst, like most jobs within the cybersecurity field are widely<br>accepted by all types of groups of people all around the world. The job is in the cyber field which<br>takes place over the internet, making it very accepted to be able to do this job pretty much<br>anywhere that has an internet connection. Cyber Forensic Analyst specifically focus on the<br>human element of cyber attacks and in doing so can use that investigation to help other jobs in<br>the field, such as those who train humans about cybersecurity and how to keep themselves and<br>their company safe on the internet. The job provides an insight that aims to protect victims of<br>cyberattacks and gather evidence of the crime in order to find the perpetrator and place them<br>responsible of that action with the help of law enforcement all over the world.<br>Conclusion<br>Cyber Defense Analyst is a very important job in the cybersecurity field that helps to<br>prevent new cyber attacks from happening. Without these cyber analysts it would lead to a<br>significant amount of the internet being too unsafe and would make all the work of other jobs in<br>the field pointless. With the increase of technology that is being created it is hard to remain 100%<br>covered, however cyber analysts and other similar fields of experts constantly need to learn in<br>order to keep up with attackers. That is why it is important that Analysts are able to use social<br>science ideas and principles while analyzing cyber attacks in order to connect the patterns and<br>profile criminals and attack patterns in general.<br>Works Cited:<br>CISA Cyber Defense Forensics Analyst. Cybersecurity and Infrastructure Security Agency CISA.<br>(n.d.). Retrieved April 7, 2024. https:\/\/www.cisa.gov\/careers\/work-rolescyber-defense-forensics<br>analyst<br>Bhattacherjee, Anol, &#8220;Social Science Research: Principles, Methods, and Practices&#8221; (2012).<br>Textbooks Collection. 3. https:\/\/digitalcommons.usf.edu\/oa_textbooks\/3<br>Carley, K.M. Social cybersecurity: an emerging science. Comput Math Organ Theory 26, 365<br>381 (2020). https:\/\/doi-org.proxy.lib.odu.edu\/10.1007\/s10588-020-09322-9<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alexander ConradCYSE 201S04\/07\/2024IntroCareer PaperCybersecurity is the general umbrella term of a multitude of different jobs and careersthat specialize in different disciplines and ideas that are more specific than just the description ofthe term. Cybersecurity as a term is to protect networks, devices, and data from any unauthorizedpersonnel. With the unending advancement of technology and inevitably&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/2024\/04\/08\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":26016,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts\/356"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/users\/26016"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts\/356\/revisions"}],"predecessor-version":[{"id":357,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/posts\/356\/revisions\/357"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/media?parent=356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/categories?post=356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/alexanderconrad-cyse200t\/wp-json\/wp\/v2\/tags?post=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}