{"id":370,"date":"2024-12-08T23:55:42","date_gmt":"2024-12-08T23:55:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/?page_id=370"},"modified":"2024-12-09T00:22:04","modified_gmt":"2024-12-09T00:22:04","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p><strong>Title: The Role of Social Science in the Career of a Cybersecurity Analyst<\/strong><br><br>A cybersecurity analyst safeguards an organization&#8217;s digital assets, including<br>hardware, software, and networks, from cyber threats. This role involves a deep<br>understanding of the company&#8217;s IT infrastructure, constant monitoring for potential<br>vulnerabilities, and implementing measures to enhance security. By understanding<br>human behavior, social and cultural factors, and ethical implications, organizations<br>can develop more effective security measures. This includes recognizing the role<br>of human error in security breaches, tailoring cybersecurity awareness programs to<br>different audiences, and balancing security needs with privacy concerns. By<br>incorporating social science insights, organizations can build a more resilient and<br>secure digital environment. As a cybersecurity analyst, one must not only rely on<br>technical expertise but also apply social science principles to address the human<br>element of cybersecurity effectively. A Cybersecurity Analyst must also be<br>mindful of the human factor, cultural context, ethical implications and the<br>marginalized groups.<br><strong>The Human Factor in Cybersecurity<\/strong>Social science principles are applied in the realm of social engineering<br>attacks. Cybercriminals often exploit human psychology to manipulate their targets<br>into revealing sensitive information or compromising security measures. One<br>example of this would be where cybercriminals threaten the user if they go to law<br>enforcement their information will be brought to the public. This now makes the<br>victim afraid and not inform the correct authorities until it\u2019s too late. That&#8217;s why<br>cybersecurity analysts must be aware of these tactics and educate users about the<br>risks. Social engineering attacks come in many different forms and can be<br>performed anywhere where human interaction is involved (CMU,2023.). By<br>understanding social engineering techniques, analysts can develop effective<br>training programs to raise awareness and reduce the likelihood of successful<br>attacks.<br><strong>Adapting to Social and Cultural Contexts<\/strong><br>Cybersecurity analysts need to take into account the social and cultural<br>contexts of their work, as attitudes toward technology and security differ across<br>cultures. Recognizing these cultural differences allows analysts to adapt their<br>security strategies to specific groups. For instance, a phishing attack that proves<br>effective in one cultural setting might not succeed in another. By factoring in these<br>social and cultural elements, analysts can design more targeted and impactful<br>security awareness programs and incident response strategies. A common<\/p>\n\n\n\n<p>illustration of cultural phishing is when a cybercriminal targets a particular cultural<br>or religious group with a personalized message. For example, during a religious<br>holiday, they might send a phishing email that appears to be a request for donations<br>from a reputable religious organization.<br>Ethical Implications in Cybersecurity<br>Cybersecurity analysts need to consider the ethical consequences of their<br>work. With the continuous advancement of technology, they face growing ethical<br>dilemmas related to surveillance, privacy, and data security. It is essential for<br>analysts to find a balance between ensuring security and safeguarding individual<br>rights and societal values.<br><strong>Addressing Marginalized Groups<\/strong><br>Marginalized groups are often more vulnerable to cyber-attacks like social<br>engineering due to limited resources, education, or technology. For instance,<br>individuals in low-income communities may lack awareness of phishing schemes,<br>making them targets for cybercriminals. Attackers exploit human behavior, using<br>fear tactics that are particularly effective against those with limited technical<br>knowledge. Additionally, quid pro quo schemes can disproportionately affect<br>underrepresented individuals who may lack access to professional IT support and<br>are more likely to trust offers of &#8220;free help.&#8221; To protect marginalized groups,<br>cybersecurity analysts should incorporate social science principles to create<\/p>\n\n\n\n<p>inclusive education and outreach programs. These initiatives must be multilingual,<br>culturally tailored, and mindful of economic barriers like inconsistent internet<br>access. Collaborating with community organizations can help ensure effective<br>training for these groups. In recognizing phishing, baiting, and other common<br>attacks.<br>In conclusion, the responsibilities of a cybersecurity analyst extend beyond<br>just technical skills. By incorporating principles from social sciences, analysts can<br>develop a deeper understanding of the human factors involved in cybersecurity.<br>This approach enables them to create more effective security measures and<br>mitigate the risks associated with cyber threats.<br><\/p>\n\n\n\n<p><strong>Reference<\/strong><br>1. Carnegie Mellon University. &#8220;Social Engineering \u2013 Information Security<br>Office \u2013 Computing Services \u2013 Carnegie Mellon University.&#8221; Carnegie<br>Mellon University, 2023, https:\/\/www.cmu.edu\/iso\/aware\/dont-take-the-<br>bait\/social-engineering.html.<br>2. Risk Crew. &#8220;Social Engineering Techniques: Hacking Human Behavior.&#8221;<br>Risk Crew, 28 Feb. 2022, www.riskcrew.com\/2022\/02\/social-engineering-<br>techniques-hacking-human-<br>behaviour\/#:~:text=By%20understanding%20the%20psychological%20prin<br>ciples,to%20protect%20ourselves%20and%20our.<br>3. Western Governors University. &#8220;Cybersecurity Analyst Career Guide.&#8221;<br>Western Governors University, www.wgu.edu\/career-guide\/information-<br>technology\/cybersecurity-analyst-career.html.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title: The Role of Social Science in the Career of a Cybersecurity Analyst A cybersecurity analyst safeguards an organization&#8217;s digital assets, includinghardware, software, and networks, from cyber threats. This role involves a deepunderstanding of the company&#8217;s IT infrastructure, constant monitoring for potentialvulnerabilities, and implementing measures to enhance security. By understandinghuman behavior, social and cultural factors,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/claudell-nurse\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":28667,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/pages\/370"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/users\/28667"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/comments?post=370"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/pages\/370\/revisions"}],"predecessor-version":[{"id":387,"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/pages\/370\/revisions\/387"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/claudell-nurse\/wp-json\/wp\/v2\/media?parent=370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}