Bj Sutton Jr.
11/24/2024
Career Paper
Career for a Cybersecurity Architect
Job Description
For this Career Paper, Let’s talk about the work force for Cybersecurity Architects; “Cybersecurity architects are responsible for designing, developing, and implementing the security systems that protect an organization’s information technology (IT) network. They work behind the scenes to keep sensitive and confidential data safe with the latest security technologies and methods.” For the important information about the Cybersecurity Architects, they are “an advanced information security professional who is responsible for ensuring that an organization’s network and data remain private and secure. Every day around the world, security breaches expose confidential information to criminals, and in some cases, these breaches can cripple an organization’s operations.” They also tend to “use hardware, software and protocols to neutralize the threats associated with various types of scams and fraud, including ransomware, malware, viruses, phishing and hacking.” They also “Overseeing enterprise-class defenses for security issues like these typically requires many years of experience.”
Social Science Principles
The Social Science aspect behind Cybersecurity Architects deals with them, “spend long hours looking at code on a computer screen, but they’re also likely to attend frequent meetings with managers, staff from other departments or their own IT teams where they need to be capable of listening to the needs and concerns of others. They may also spend time on the phone with vendors and technology experts outside their organizations.” Cybersecurity Architects also spend a lot of time “developing both soft and hard skills that serve them well throughout their careers. Some of the most important soft skills are excellent written and oral communication skills, the ability to think critically and decisively, internal motivation and a self-starter attitude, and the ability to work well with teams and other departments. A successful cybersecurity architect may be equal parts methodical, inquisitive and creative.”
Career Connection to society
The Big Connection between the Society and Cybersecurity Architects is to help “keep up with the latest news, technologies and security breaches to better protect their organizations. Many cybersecurity architects build entire IT security infrastructures from the ground up, and others update existing systems to keep up with the latest threats.” Without this career, a lot of the updates that technology gets in this present would leave a lot of organizations, companies and businesses weak to attacks, making it easier for data and private information to get hacked and solen.
Concepts
Some of these concepts are the real reason why this job stands as one important thing to help keep private information safe like, “Email phishing which is a deceptive tactic where attackers send emails that appear legitimate to trick recipients into revealing sensitive information (i.e., names, dates of birth, insurance numbers) or downloading malicious software.” Also, “Ransomware, which is malware that locks or encrypts a user’s data until a ransom is paid. Even if the ransom is paid, there is no guarantee the data will be restored.” Plus, “Data theft, which is the loss or theft of devices like laptops and smartphones poses a significant risk, particularly if they contain sensitive data. This can result in unauthorized access and misuse of the data, allowing hackers to lock systems and cause extensive damage to both the device owner and the affected organizations and systems.” Last, “Insider threats that may occur when individuals within an organization unintentionally or deliberately compromise data. Accidental threats result from mistakes, while intentional threats involve malicious actions for personal gain or harm. These attacks have substantial consequences for patients, healthcare services and organizations.”
Challenges
There tends to be some problems that challenge the work force for the Cybersecurity architects which includes, “The level of sophistication of cyber-attacks has gone to all-time highs and those are very difficult to detect and defend against. According to techniques like Advanced Persistent Threats, attackers break into a network and often remain undetected for months or even years.” Also, with “The rapid rate at which technology is changing is a blessing and a curse as far as cybersecurity is concerned. Though novel technologies bring greater efficiency and innovation, at the same time, they introduce new vulnerabilities that could be used by cybercriminals.” Plus, “With the third-party vendors and other partners increasingly being used to manage and operate most business functions, the element of risk in security breaches via these external agencies proportionately goes up.” One big challenge would be Human Errors, “Human error remains one of the major contributing factors to cybersecurity breaches and tends to be the weakest link in organizational security defenses. Poor passwords, credential sharing between several accounts, and falling for phishing remain some of the most common mistakes.” This would also lead up to, “the general shortage of skilled cybersecurity professionals is a big challenge. As cyber threats increase in their frequency and complexity, the requirement for qualified cybersecurity experts has never been higher; yet this demand has not been met in return with an adequate supply of qualified professionals who would help stop the increase in the vulnerability of organizations to attacks.”
Cite Sources
Praveen Y, Kim M, Choi K-S. Cyber victimization in the healthcare industry: Analyzing offender motivations and target characteristics through routine activities theory (RAT) and cyber-routine activities theory (cyber-RAT). International Journal of Cybersecurity Intelligence & Cybercrime [Internet]. 2024;7(2). Available from: https://vc.bridgew.edu/cgi/viewcontent.cgi?article=1186&context=ijcic |
Cybersecurity architect: Salary, job description and education [Internet]. Cybersecurity Architect: Salary, Job Description and Education. 2023 [cited 2024 Nov 25]. Available from: https://www.augusta.edu/online/blog/cybersecurity-architect-salary |
Top 5 cyber security challenges [Internet]. SentinelOne. 2024 [cited 2024 Nov 25]. Available from: https://www.sentinelone.com/cybersecurity-101/cybersecurity/cyber-security-challenges/ |