{"id":331,"date":"2024-04-22T02:21:18","date_gmt":"2024-04-22T02:21:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bsong002\/?page_id=331"},"modified":"2024-04-22T02:23:42","modified_gmt":"2024-04-22T02:23:42","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/bsong002\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-left\">A cybersecurity ethics analyst has a role within organizations to develop and maintain<br>effective security control to protect against cyber threats and ensure the confidentiality of<br>integrity, and availability of an organization\u2019s data and systems. As technology continues to<br>evolve, a cybersecurity ethics consultant must navigate, protect, and mitigate the ever-growing<br>issues of ethics within the internet to maintain the trust of stakeholders, customers, partners, and<br>employees alike. According to EC University (2023), cyber security consultants&#8217; roles within an<br>organization could range from developing security strategies and implementing security policies<br>that would best mitigate risk to a more extroverted approach of educating the employees of the<br>organization of those new policies and the importance of informing all employees of the best<br>security practices going forward.<br>Responding to security incidents is one of the main jobs conducted by a cybersecurity<br>analyst. To do so, the consultant could act as the perpetrator to perform information maneuvers,<br>via a mock security breach, to identify any possible vulnerabilities and loose access points. By<br>studying recent cyber-attacks performed at all levels, consultants would be able to specialize in<br>certain security measures needed for a specific company. For example, hackers who wish to<br>target big corporations would have aspirations notoriety and financial gain. However, smaller<br>companies would be easier targets for more opportunistic attackers who most likely use a \u201cline<br>and bait\u201d tactic on a multiple small business at once. According to LeClair (2024), \u201c\u201cFifty<br>percent of small to medium-sized businesses (SMB) have been the victims of cyber attack and<\/p>\n\n\n\n<p class=\"has-text-align-left\">over 60% of those attacked go A GROWING CONCERN FOR SMALL BUSINESS out of<br>business.\u201d And to do so, these consultants must stay up to date with the latest firmware and<br>software updates.<br>Protecting an organization\u2019s networks and systems is critical within this field. According<br>to the Bureau of Labor Statistics (2023), \u201c&#8230;must stay up to date on IT security on the latest<br>methods attackers are using to infiltrate computer systems. Analysts need to research new<br>security technology to decide what will most effectively protect their organization.\u201d These<br>workers can also be known as a manual update to the whole organization. Not only do these<br>analysts maintain and update firewalls, but they prepare reports on security standards and<br>recommend update enhancements to the senior IT staff of the organization. This education<br>system through organizations is the most practical way of promoting social responsibility by<br>creating a more informed basis of workers using the internet. By teaching the senior staff of the<br>latest cybersecurity measures, who would then share that knowledge to all employees of the<br>organization, would allow for a \u201ctrickle down\u201d of practical info that could save professional and<br>personal livelihoods.<br>Ultimately, as cybercrime begins to take over the vulnerability within the business<br>economy, jobs like a cybersecurity ethics analyst could help negate the growing theft that is<br>taking over the nation. At a staggering rate of four hundred forty-five billion dollars lost to<br>cybercrime worldwide, and intellectual property amounting to one hundred billion dollars being<br>stolen by individuals, the only way to combat such an infectious virus is to strengthen the<br>immune system. As we trade security for accessibility, we expose ourselves to greater risk.<br>Therefore, the role of a cybersecurity ethics analyst becomes vital to protecting the integrity and<br>availability of all data and systems.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n\n<p class=\"has-text-align-left\">WORKS CITED:<br>U.S. Bureau of Labor Statistics. (2023, September 6). Information security analysts :<br>Occupational Outlook Handbook. U.S. Bureau of Labor Statistics.<br>https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-<br>analysts.htm#tab-2<br>The impact of cybersecurity on Small Business. (n.d.-a).<br>https:\/\/www.sbir.gov\/sites\/all\/themes\/sbir\/dawnbreaker\/img\/documents\/Course10-<br>Tutorial1.pdf<br>Cybersecurity ethics grows in urgency as the digital landscape continues to Transform Society.<br>Cybersecurity Ethics: What Cyber Professionals Need to Know. (2023, August 21).<br>https:\/\/www.augusta.edu\/online\/blog\/cybersecurity-ethics<a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm#tab-2\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm#tab-2\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.sbir.gov\/sites\/all\/themes\/sbir\/dawnbreaker\/img\/documents\/Course10-Tutorial1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.sbir.gov\/sites\/all\/themes\/sbir\/dawnbreaker\/img\/documents\/Course10-Tutorial1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cybersecurity ethics analyst has a role within organizations to develop and maintaineffective security control to protect against cyber threats and ensure the confidentiality ofintegrity, and availability of an organization\u2019s data and systems. As technology continues toevolve, a cybersecurity ethics consultant must navigate, protect, and mitigate the ever-growingissues of ethics within the internet to maintain&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bsong002\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":27628,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/pages\/331"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/users\/27628"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/comments?post=331"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/pages\/331\/revisions"}],"predecessor-version":[{"id":337,"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/pages\/331\/revisions\/337"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bsong002\/wp-json\/wp\/v2\/media?parent=331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}