{"id":356,"date":"2026-04-28T03:19:13","date_gmt":"2026-04-28T03:19:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandonvuono\/?page_id=356"},"modified":"2026-04-28T03:19:13","modified_gmt":"2026-04-28T03:19:13","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/brandonvuono\/cyse201s\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Brandon Vuono&nbsp;<\/p>\n\n\n\n<p>CYSE201S&nbsp;&nbsp;<\/p>\n\n\n\n<p>Trin Woodbury&nbsp;<\/p>\n\n\n\n<p>26 April 2026&nbsp;<\/p>\n\n\n\n<p>Cyber Career Paper&nbsp;<\/p>\n\n\n\n<p>Human&nbsp;Factors&nbsp;beyond&nbsp;technology: How&nbsp;Social Science Shapes Cyber&nbsp;Security&nbsp;<\/p>\n\n\n\n<p>When people today think of cybersecurity, many people picture fast coding breaking down firewalls and getting great access to&nbsp;important information. This is the way&nbsp;Hollywood&nbsp;has glorified technology and the world&nbsp;of attackers.&nbsp;In reality cybersecurity is eqaully about people as it is about binary bits. Cyber security analysts are the&nbsp;backbone&nbsp;of&nbsp;the career&nbsp;profession.&nbsp;They spend a lot of time dealing and working with human behaviors, as well as decision making and understanding deeper social patterns.&nbsp;Cyber-attacks&nbsp;succeed not because the system is&nbsp;extremely&nbsp;weak but more often due to the influence on the individual who was manipulated by an easy tactic. With this social science principles such as&nbsp;objectivity, relativism,&nbsp;determinism&nbsp;and parsimony play&nbsp;an important role&nbsp;in the social and cyber relationship.&nbsp;Understanding these concepts will help a cybersecurity analyst do their job better and help them make the right decisions.&nbsp;This will protect not only systems but people at large.&nbsp;&nbsp;<\/p>\n\n\n\n<p>One of the most important principles in cybersecurity to understand is objectivity. Making decisions based on evidence rather than personal bias is key&nbsp;to&nbsp;understanding the&nbsp;problem&nbsp;they face and a clear min on how to fix&nbsp;it.&nbsp;Security analysts rely heavily on evidence when investigating&nbsp;an&nbsp;incident. An example of this is if unusual activity appears on their&nbsp;network;&nbsp;analysts cannot assume who might be&nbsp;doing the activities. They must relentlessly trace the&nbsp;breadcrumbs&nbsp;left behind to&nbsp;identify&nbsp;the person.&nbsp;This&nbsp;ensures that&nbsp;their conclusions are&nbsp;accurate&nbsp;and fair. Objectivity is critical because biased decisions can lead to&nbsp;missed&nbsp;threats or&nbsp;false&nbsp;accusations, both which&nbsp;have&nbsp;serious consequences&nbsp;(Anderson, 2020).&nbsp;<\/p>\n\n\n\n<p>Another key concept is relativism. This suggests that behavior must be understood within its specific context. In cybersecurity&nbsp;context, it&nbsp;matters a lot.&nbsp;If&nbsp;an employee logging&nbsp;in from another country may seem suspicious&nbsp;at first glance depending&nbsp;on a virtual private network or the foreign&nbsp;country&#8217;s&nbsp;IP address.&nbsp;If the employee is&nbsp;traveling for&nbsp;work with&nbsp;notice,&nbsp;the cyber&nbsp;security&nbsp;analyst must sort through weather or&nbsp;not;&nbsp;the activity is&nbsp;legitimate.&nbsp;This context is imperative for not having false alarms. Without this&nbsp;perspective,&nbsp;analysts could miss&nbsp;understanding&nbsp;the login and&nbsp;make&nbsp;a harmless action as dangerous as an unauthorized user on the network.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Determinism is also a major factor for cybersecurity professionals and those of the cyber analyst career. Determinism is the idea that behavior is influenced by underlying causes such as&nbsp;psychological or social factors. Cyber criminals prey on human behavior that is predictable to get the intended end state they are after. This can be seen with attacks such&nbsp;as phishing&nbsp;emails that are designed to be&nbsp;trustworthy and enticing to the victim.&nbsp;This creates the urgency to click the email or link associated giving the attacker that avenue&nbsp;they\u2019re&nbsp;looking for. Cybersecurity analysts study these&nbsp;patterns&nbsp;to understand why people fall for these&nbsp;scams&nbsp;regardless of the&nbsp;number&nbsp;of&nbsp;years&nbsp;that they have&nbsp;at the job. By recognizing behavior is influenced by certain triggers, analysts can&nbsp;develop&nbsp;better training programs and security systems&nbsp;(Hadnagy, 2018).&nbsp;The training of teaching employees to scan each email with high scrutiny is key for&nbsp;protection.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In addition to these few&nbsp;concept&nbsp;cybersecurity analysts apply a much broader scope when it comes to the social sciences. Socialization affects every aspect of our lives. Cybersecurity takes this into perspective of protecting their network and&nbsp;education for&nbsp;the end users of the&nbsp;network.&nbsp;&nbsp;If the workplace culture does not prioritize cybersecurity, employees may ignore best practices from the cyber community.&nbsp;Analysts&nbsp;work tirelessly to create a culture that lives and&nbsp;breathes&nbsp;security.&nbsp;The cybersecurity professionals in most settings&nbsp;represent&nbsp;the form of authority over their craft and those who use it to do the job. This helps&nbsp;influence the best practices to keep the network safe. This&nbsp;in turn&nbsp;builds deeper layers of trust. End users must trust their security systems and warnings&nbsp;to&nbsp;follow the guidelines put&nbsp;in place&nbsp;for protection.&nbsp;<\/p>\n\n\n\n<p>Another challenge that security analysts deeply study is the victims that are targeted by cyber attackers.&nbsp;&nbsp;Elderly individuals, for&nbsp;example,&nbsp;are constantly targeted for&nbsp;scams.&nbsp;Scams&nbsp;that range from phishing emails to financial&nbsp;scams&nbsp;attempting&nbsp;to get money from wire transfers. Lower income&nbsp;communities&nbsp;are also seen to be at&nbsp;a higher&nbsp;risk of attacks. Not having the means to get the most up to date&nbsp;systems,&nbsp;this creates easy attack vectors.&nbsp;These issues show that cybersecurity is not just a technical field. The social aspect of the profession needs to be addressed and understood.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The relationship between cybersecurity analysts and society is complex and constantly changing. As society becomes more ingrained and dependent on technology, the role of cyber security analysts becomes more important.&nbsp;They help protect systems that people rely on every day such as banks, hospitals, and communication systems. If these systems become&nbsp;compromised,&nbsp;they&nbsp;would have effects that could be widespread&nbsp;on&nbsp;a whole nation.&nbsp;Society also plays&nbsp;a large role&nbsp;in influencing cybersecurity&nbsp;analysts.&nbsp;For example, many people choose simple passwords that are easy to remember. Research shows that users often ignore security advice when it feels inconvenient, which highlights the&nbsp;importance&nbsp;of understanding human behavior in cyber security (Herley, 2009). This became&nbsp;such&nbsp;a problem&nbsp;with passwords and&nbsp;requirements&nbsp;that&nbsp;has&nbsp;since changed. The recommendation used to be random letters and&nbsp;characters&nbsp;with special letters and numbers. This usually resulted in what was known as the keyboard walk password.&nbsp;This made it easy to brute force to attack the password. It is now recommended to use long passphrases that are easily remembered and to remove the&nbsp;thirty-to-sixty-day&nbsp;password resets. This shows that society has a hold on the cyber security&nbsp;profession&nbsp;and the changes it makes.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In conclusion, cyber security analysts rely heavily on social science principles in their daily work.&nbsp;Concepts such as objectivity, relativism, and determinism&nbsp;help them analyze threats.&nbsp;These&nbsp;professionals&nbsp;must also consider much broader lense on social issues. Including inequality in marginalized groups. As well&nbsp;as&nbsp;how&nbsp;continence&nbsp;has a hold on the population technology&nbsp;serves. All these concepts show how cybersecurity and society are deeply connected to one another. Both shaping and being shapped by human behaviors. As technology&nbsp;advances,&nbsp;the human factor will remain a limiting factor of cybersecurity. Making social science an essential&nbsp;component&nbsp;to the&nbsp;profession&nbsp;of cybersecurity.&nbsp;&nbsp;<\/p>\n\n\n\n<p>References&nbsp;<\/p>\n\n\n\n<p>Anderson, R (2020) Security engineering: A guide to building dependable distributed systems&nbsp;<\/p>\n\n\n\n<p>Hadnagy, C (2018) Social engineering: The science of human hacking&nbsp;<\/p>\n\n\n\n<p>Herley, C (2009)&nbsp;So long, and no thanks for the externalities: The rational rejection of security advice by users.&nbsp;Proceedings of the New Security Paradigms Workshop, 133\u2013144.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brandon Vuono&nbsp; CYSE201S&nbsp;&nbsp; Trin Woodbury&nbsp; 26 April 2026&nbsp; Cyber Career Paper&nbsp; Human&nbsp;Factors&nbsp;beyond&nbsp;technology: How&nbsp;Social Science Shapes Cyber&nbsp;Security&nbsp; When people today think of cybersecurity, many people picture fast coding breaking down firewalls and getting great access to&nbsp;important information. This is the way&nbsp;Hollywood&nbsp;has glorified technology and the world&nbsp;of attackers.&nbsp;In reality cybersecurity is eqaully about people as it is&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brandonvuono\/cyse201s\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":18452,"featured_media":0,"parent":308,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/pages\/356"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/users\/18452"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/pages\/356\/revisions"}],"predecessor-version":[{"id":357,"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/pages\/356\/revisions\/357"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/pages\/308"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandonvuono\/wp-json\/wp\/v2\/media?parent=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}