{"id":209,"date":"2024-09-25T18:50:42","date_gmt":"2024-09-25T18:50:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/?page_id=209"},"modified":"2024-12-09T02:13:31","modified_gmt":"2024-12-09T02:13:31","slug":"journal-entries","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/journal-entries\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p><strong>Cybersecurity Analyst and Social Science<\/strong><br><em>Introduction<\/em><br>The career I chose to write this paper on is a cybersecurity analyst. The reason I<br>chose this career is because I find it to be one of the most interesting jobs in the<br>cybersecurity world. The role of a cybersecurity analyst is to protect the security of<br>information and all valuable assets from any cyber threats. A cybersecurity analyst<br>deals with hardware, software, and networks keeping them safe from theft and<br>unauthorized access. There are a few important ways that this career can relate to<br>social sciences. In this paper I will give a few reasons why it does.<br><em>Social Science concepts related to cyber security analysts<\/em><br>A cybersecurity analyst deals with different types of threats, but every threat<br>comes from a person. Understanding social science aspects of cybersecurity can help<br>the analyst have an upper hand against people who have harmful intentions towards a<br>company or organization. This is called social cybersecurity, according to an article on<br>researchgate.net Kathleen Carley stated that it is created to counter threats that emerge<br>from the advances of technology and our reliance on it. Social sciences are based off<br>people and their relationship with society. This relationship with society also covers<br>criminals, cybersecurity analysts need to have a strong understanding of this<br>relationship with society and people to better counter threats both active and also in<\/p>\n\n\n\n<p>their security plan. A good example of this is by learning about a marginalized group.<br>Elderly people are often targeted a lot, according to the CISA as of 2012 53% of people<br>over 65 use the internet. The reason they are targeted is because of their little<br>experience with technology, which makes them easier targets. A cybersecurity analyst<br>can use information on this marginalized group to better prevent threats towards elderly<br>people by structuring their plan based off of it. Using information on this marginalized<br>group will also help the analyst deal with active threats in real time.<br>Analysts don&#8217;t only have to protect elderly people but they also have to protect<br>people who are more experienced with technology, but are falling for a scam. Analysts<br>sometimes have to deal with threats in real time, sometimes people fall for scams even<br>though they have experience with technology.<br>Another social science principle an analyst needs would be the CIA triad,<br>according to sangfor.com it is a fundamental concept in information security. The CIA<br>triad is a widely accepted structure that every cybersecurity major needs to understand.<br>It is a model for a strong security system that stands for confidentiality, integrity, and<br>availability. When an analyst uses the CIA triad they can create a strong security<br>system to keep a system from loss and theft.<br>Another helpful concept from this class that a cybersecurity analyst needs is<br>knowing the five types of neutralizations. The five types of neutralizations are denial of<br>injury, denial of victim, denial of responsibility, appeal to higher loyalty, and<br>condemnation of the condemners. These are five common reasons people commit<br>crime, each are \u201cneutralizations\u201d or driving forces that turn off somebody&#8217;s conscience<br>enabling them to commit a crime and harm someone. A cybersecurity analyst deals with<\/p>\n\n\n\n<p>criminals, and if they study the five neutralizations they can better face any threats both<br>active and during prevention.<br>Another concept from class that an analyst should know is the Social Order,<br>which is a theory that states that social sciences are just as scientific as the natural<br>sciences. This means that a framework can be created for cybersecurity, better helping<br>an analyst do their job. Dealing with cybersecurity in a structured and scientific way can<br>help somebody keep a network, software, and hardware safe from threats. Another vital<br>concept from class is social engineering, when an analyst studies types of social<br>engineering they can be aware of threats and deal with them.<br><em>Conclusion<br><\/em>A cybersecurity analyst prevents theft, loss, and unauthorized access to<br>networks, software, and hardware. While all of these threats are done through<br>computers and malware the core threat is people with malicious intentions. A<br>cybersecurity analyst using social sciences is extremely important for prevention. In this<br>paper I related some of the most notable concepts we&#8217;ve learned in class to this job<br>position.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Analyst and Social ScienceIntroductionThe career I chose to write this paper on is a cybersecurity analyst. The reason Ichose this career is because I find it to be one of the most interesting jobs in thecybersecurity world. The role&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/chrisangcyber\/journal-entries\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29623,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/pages\/209"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/users\/29623"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/comments?post=209"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/pages\/209\/revisions"}],"predecessor-version":[{"id":273,"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/pages\/209\/revisions\/273"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/chrisangcyber\/wp-json\/wp\/v2\/media?parent=209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}