{"id":316,"date":"2024-04-21T21:09:38","date_gmt":"2024-04-21T21:09:38","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/?p=316"},"modified":"2024-04-21T21:09:38","modified_gmt":"2024-04-21T21:09:38","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/2024\/04\/21\/career-paper\/","title":{"rendered":"Career paper"},"content":{"rendered":"Basil Ogbomoh<br \/>4\/7\/2024<br \/>Cyber Threat Intelligence Analysts<br \/>The cybersecurity career I chose was Cyber Threat Intelligence Analyst also known for<br \/>short as CIA. They are information security professionals who use their knowledge and skills to<br \/>collect and analyze data to create intelligence with whatever department they are working for. I<br \/>chose this career because it relies heavily on social science research and principles. For example,<br \/>Cyber intelligence is the knowledge that allows you to prevent or mitigate cyber attacks by<br \/>studying the threat data and providing information on adversaries (What Is Cyber Threat<br \/>Intelligence). This helps analysts to identify, prepare, and prevent attacks by providing<br \/>information on attackers, their motive, and their capabilities. In our recent modules, we talked<br \/>about understanding cybercrime from a criminal&#8217;s perspective and trying to understand why they<br \/>do what they do. The main purpose of this job is to study the pattern of attacks collected from old<br \/>data so that we can mitigate risk and understand the motive behind the attack. Module 12 goes in<br \/>depth about hacking motives. This module can closely relate to my career choice because the<br \/>CIA&#8217;s main goal is to understand hackers&#8217; motives. This is needed so agencies can create laws to<br \/>deter these things from happening. This job relies on surveys, surveillance, experiments, and<br \/>much more. The United States currently lacks a response to deter the continued attacks and<br \/>safety for marginalized communities. Marginalized groups, including racial and ethnic<br \/>minorities, may be disproportionately affected by cyber threats due to systemic inequalities and<br \/>lack of access to resources and information. Another challenge that arises is the language<br \/>barriers, distrust of authorities, and historical experiences of discrimination that may hinder<br \/>efforts to collaborate between security and these groups. Without the participation of these<br \/>groups, we may overlook their perspectives and needs from them, so they won&#8217;t get the<br \/>protection they need. Addressing these challenges requires a commitment from cybersecurity<br \/>professionals. Cyber threat intelligence must strive to recognize and mitigate biases in threats<br \/>and gathering processes. We need to actively engage with marginalized communities to<br \/>understand their concerns and priorities (Tisdale, 2024). Cyber threat Intelligence Analysts play<br \/>a crucial role in leveraging social science research and principles to enhance cybersecurity and<br \/>mitigate threats throughout marginalized groups\/communities (9 Ways To Leverage Cyber<br \/>Threat Intelligence, n.d.). By understanding behavior, predicting threat trends, and fostering<br \/>collaboration, analysts can contribute to building resilience to cybercrime. The integration of<br \/>social science into threat intelligence operations will keep specialists ahead of emerging risks.<br \/>References<br \/>9 Ways To Leverage Cyber Threat Intelligence. (n.d.). RiskXchange. Retrieved April 7,<br \/>2024, from https:\/\/riskxchange.co\/1007079\/ways-to-leverage-cyber-threat-intelligence\/<br \/>Tisdale, N. (2024, February 12). The Hidden Injustice of Cyberattacks. WIRED.<br \/>Retrieved April 7, 2024, from https:\/\/www.wired.com\/story\/cybersecurity-marginalized-<br \/>communities-problem\/<br \/>What is Cyber Threat Intelligence | Cyber Threat Intelligence Analyst | Types of Threat<br \/>Intelligence. (n.d.). EC-Council. Retrieved April 7, 2024, from<br \/>https:\/\/www.eccouncil.org\/cybersecurity-exchange\/threat-intelligence\/what-is-cyber-<br \/>threat-intelligence\/","protected":false},"excerpt":{"rendered":"<p>Basil Ogbomoh4\/7\/2024Cyber Threat Intelligence AnalystsThe cybersecurity career I chose was Cyber Threat Intelligence Analyst also known forshort as CIA. They are information security professionals who use their knowledge and skills tocollect and analyze data to create intelligence with whatever department they are working for. Ichose this career because it relies heavily on social science research&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/2024\/04\/21\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":28624,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts\/316"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/users\/28624"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/posts\/316\/revisions\/317"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/basilogbomoh1\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}