{"id":315,"date":"2025-04-29T23:39:24","date_gmt":"2025-04-29T23:39:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/?page_id=315"},"modified":"2025-04-30T00:49:21","modified_gmt":"2025-04-30T00:49:21","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong><em>Inside Cybersecurity incident Response: A Key Overview of the Field<\/em><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Introduction<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left\">In the Field of cybersecurity incident response there are a great number of factors that go into this career. These factors consist of identifying the Human element, the relationship to social sciences, and the ethical and social considerations that revolve around it. In this paper I will explain cybersecurity incident response in its entirety while giving the appropriate information about the factors presented.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>The Human Element in Incident Response<\/strong><br>For Cybersecurity jobs identifying the human element is an important part of this line of work, so for incident response it is an important part of this career as it can potentially be a risk. In incident response it \u201crefers to the vulnerability of individuals in an organization to either accidentally or deliberately cause security breaches ort mishandle cybersecurity incidents.\u201d (Manpreet &amp; Manpreet, 2024) There are multiple factors from this that could be related to this statement one of them being human error. Human error is one of the common reasons for an incident to occur online which can be the cause of either negligence, the victims lack or awareness or if the victim is being affected by someone close to them all of these factors can cause more problems to form in the process. The best way to avoid these problems can be through many different ways. One can be from learning more about the threats by being educated on what is around you online which can be from \u201cCybersecurity awareness programs\u201d. A second way can be from having companies, institutions, or organizations \u201cEstablish clear polices and procedures\u201d which can be put in the form of \u201cGuidelines\u201d or \u201cincident response plans\u201d. And lastly its important to implement technical controls so that you can make sure your data and important information stays safe from insider and outsider attack.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Applying Social Science in Incident Response<\/strong><br>When seeing how professional incident response workers apply social science to their work its important so see the different factors that they rely on. These factors are shaped from an interdisciplinary field called social cybersecurity which helps apply the human behavior, psychology, and social interaction with incident response. Through this field incident response can examine how \u201cindividuals and communities can be takin advantage of through means of disinformation, influence, and social engineering\u201d (Carley, 2020). Professionals in the field use social network analysis, AI, and Research on Behavior, through this they can identify bots and trolls, while also minimizing the psychological and social impact from cyber threats. Since this was the case the BEND framework was introduced and was used to categorize communication maneuvers. This in all helps cybersecurity experts better understand and respond well to cybercrimes that revolve around lying, propaganda, and manipulation.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Ethical and Social Considerations in Incident Response<\/strong><br>In incident response there are both ethical and social considerations that should be talked about. On the incident responders have to do many things such as maintain privacy when handling important data, ensuring transparency with stakeholders, and notifying affected individuals in a timely manner. When it comes to these considerations the responders must be as accurate as possible with the information at their disposal and help and support those who were impacted by security breaches. That\u2019s not all though they are also the ones to take the fall while making sure to minimize the damage further to protect the company. When it comes to this its important that responders are as accurate and honest as possible to their consumers and partners who were affected.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>Conclusion<\/strong><br>To Sum up what was said, the field of cybersecurity incident response has many factors to it and from each factors lies its own source of information and steps for someone in this field to know. With all the information shown its best to say that the field of cybersecurity is not a hard field to be apart of, but it is one that takes a lot of work and relies on someone who is very social and can handle situations that need customer assistance and reassurance.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>References<\/strong><br>Alam, M., Safayat, R., &amp; Anan. (2023). The Human Element in Cybersecurity -Bridging<br>the Gap Between Technology and Human Behaviour. https:\/\/www.researchgate.net\/profile\/Md-Mahabub Alam2\/publication\/380270220_The_Human_Element_in_Cybersecurity_-_Bridging_the_Gap_Between_Technology_and_Human_Behaviour\/links\/66336f4d3524<br>304153582cba\/The-Human-Element-in-Cybersecurity-Bridging-the-Gap-BetweenTechnology-and-Human-Behaviour.pdf<br>Carley, K. M. (2020). Social cybersecurity: An emerging science. Computational and<br>Mathematical Organization Theory, 26(4), 365-381. https:\/\/doi.org\/10.1007\/s10588-020-<br>09322-9<br>EthicsfIRST: Ethics for Incident Response and Security Teams. (n.d.). FIRST \u2014 Forum<br>of Incident Response and Security Teams.<br>https:\/\/www.first.org\/global\/sigs\/ethics\/ethics-first<br>Manpreet, &amp; Manpreet. (2024, May 28). Human Risk Elements in Incident Response &#8211;<br>Scrut Automation. Scrut Automation. https:\/\/www.scrut.io\/post\/human-elementdefending-against-risks-in-incident-response<br>Staff Writers. (2020, January 10). How to Become an Incident Responder |<br>Requirements for Incident Responder Jobs. CyberDegrees.org; CyberDegrees.org.<br>https:\/\/www.cyberdegrees.org\/jobs\/incident-responder\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Inside Cybersecurity incident Response: A Key Overview of the Field Introduction In the Field of cybersecurity incident response there are a great number of factors that go into this career. These factors consist of identifying the Human element, the relationship to social sciences, and the ethical and social considerations that revolve around it. In this&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":30282,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/pages\/315"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/users\/30282"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/comments?post=315"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/pages\/315\/revisions"}],"predecessor-version":[{"id":335,"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/pages\/315\/revisions\/335"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ashawnrobertson\/wp-json\/wp\/v2\/media?parent=315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}