{"id":346,"date":"2025-04-28T04:27:13","date_gmt":"2025-04-28T04:27:13","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cphil021\/?page_id=346"},"modified":"2025-04-28T04:37:18","modified_gmt":"2025-04-28T04:37:18","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cphil021\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center\">Charles Phillips<br>Professor Diwakar Yalpi<br>CYST 201S<br>17 April, 2025<br>The Role of Social Science Principles in the Career of a Cybersecurity Analyst<br>BLUF: Just like in many of the disciplines of social science, cybersecurity analysis is complex,<br>ethical, social, and technical. Cybersecurity analysts rely on their knowledge of social science<br>principles in accounting for and managing the complexities in their daily work. For example,<br>when programmers code systems, consideration of social science elements like relativism,<br>objectivity, parsimony, empiricism, and ethical neutrality aspects may help analyze human<br>behaviors, secure sensitive data, and formulate equitable security solutions to benefit society,<br>including disadvantaged communities.<br><strong>Introduction:<\/strong><br>Cybersecurity is often taken to be a technical field, involving understanding of both subject<br>matter (technologies) and systems, but it inherently requires a similar understanding of human<br>behavior, moral choices, and social context. The role of a cybersecurity analyst is an example of<br>the crossroads of cybersecurity and social science given COVID-19 has escalated the impact of<br>human factors to threats in cyberspace. The understanding of social science principles can<br>provide cybersecurity analysts with foundational principles to conduct ethical investigations, risk<br>analyses, and manage diverse populations of users. This paper builds on what the informed<br>cybersecurity analyst will need when examining how social science principles and research are <\/p>\n\n\n\n<p class=\"has-text-align-center\">invoked in their day-to-day work, particularly when working with marginalized groups and<br>society at large.<br><strong>The Role of a Cybersecurity Analyst:<\/strong><br>Cybersecurity analysts protect an organization&#8217;s digital environment by identifying weaknesses<br>in systems, defending against attack and threats, and preventing future attacks. Their role<br>includes monitoring and inspecting network traffic and help with penetration testing of systems<br>and producing reports for stakeholders. More than these tasks, though, analysts need to<br>understand the motives and actions of malicious users and legitimate users. This is where the<br>value of social science principles come in (Information Security Analyst Career, 2024).<br>Applying Social Science Principles in Cybersecurity Analysis<br><strong>Relativism and Objectivity:<\/strong><br>Cybersecurity analysts work in multicultural and worldwide environments. In this context,<br>relativism, or the understanding that values and norms differ between cultures, is important. For<br>example, one culture may consider something to be an ethical practice that another country may<br>find invasive. Analysts are required to adjust their security practices according to these<br>differences while maintaining organizational security. At the same time, objectivity helps<br>analysts minimize personal biases from entering into their analysis or decision-making, so that<br>they can objectively analyze case studies regarding insider threats or user behavior. Objectivity<br>also helps analysts compose reports in a neutral and evidence-based way (Writers, 2023).<br><strong>Parsimony and Empiricism: <\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">In cybersecurity, parsimony directs analysts to consider the simplest explanations for abnormal<br>behavior on a network or an unusual encounter with a system. Parsimony helps prevent<br>over-the-top complexity that can waste precious resources(Writers, 2023). Empiricism is the<br>reliance on observed and measurable evidence. So, for example, analysts should arrive at a<br>conclusion based on data and patterns rather than speculation as prescribed in ATTR. Parsimony<br>and empiricism each help facilitate due diligence regarding the complex and sometimes<br>convoluted process of threat detection and response. Analysts utilize empiricism daily when<br>looking through system logs or equipment or when receipt of intrusion detection alerts&#8211;they first<br>acknowledge the evidence in the logs first and deal with explaining what it might represent<br>afterwards!<br><strong>Ethical Neutrality and Skepticism<\/strong><br>Ethical neutrality is necessary for analysts who have to be even-handed in their district or other<br>cities regardless of opinions they may personally have about the users or suspects. Analysts need<br>to be neutral regardless of whether they are assessing employees or external hackers. Skepticism<br>is a serious analytical principle pertaining to the ideas of the analyst questioning that which<br>seems anomalous and reserving judgment about digital evidence all the way until the end of the<br>analysis. Having drama and ambiguity around data circumstance and the inability to discern<br>between what is human error and malicious intent matters in a cyber investigation. With data<br>breach scenarios, skepticism should compel the analyst to probe ambivalence about whether an<br>incident was a breach or not and prompt the analyst to dig deeper to rule on whether it was an<br>incident, where it came from, and what if anything occurred (Your Next Move: Cybersecurity<br>Analyst, 2023b). <\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Determinism in Behavioral Analysis<\/strong><br>Determinism- the idea that our behavior is a result of previous causes- supports the behavioral<br>analysis area of cybersecurity. Analysts use this to understand why particular users fall victim to<br>phishing scams or why the threat actor may have used a certain attack vector. This understanding<br>allows us to create improved training programs and security controls for user&#8217;s behavioral<br>patterns.<br><strong>Interacting with Marginalized Groups and Society at Large<\/strong><br>Cybersecurity analysts need to acknowledge their work has an impact on different groups,<br>including marginalized communities. These communities often face more cyber-related risks due<br>to a lack of digital literacy or secure technology(Information Security Analyst Career, 2024).<br>Using the principles associated with social science, analysts can develop inclusive policies<br>protecting against threats that are fair and equitable. To illustrate, the principle of ethical<br>neutrality would prevent analysts from profiling a user based on their socio-economic status,<br>racial background, or where they live when conducting analyses of suspicious activity.<br>Empiricism ensures that no user is judged based on anything other than be haviour and evidence<br>against them and not through any form of bias. Communities that are marginalized undergo a<br>higher rate of cyber victimization &#8211; such as identity theft and phishing schemes that are targeted<br>at low-income individuals or ethnic minorities. By utilizing an approach informed by social<br>science, cybersecurity analysts can provide educational campaigns and support mechanisms to<br>mitigate these risks(Information Security Analyst Career, 2024). The principle of relativism<br>enables analysts to appreciate the specific vulnerabilities of various communities, allowing them<br>to develop appropriately tailored and culturally relevant cybersecurity resources. <\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Challenges in Practice<\/strong><br>Analysts within cybersecurity encounter three fundamental challenges, as evidenced by:<br>Balancing security and privacy:<strong> <\/strong>Analysts are expected to utilize effective security procedures<br>to meet their duties; the challenge is to do this while respecting user privacy. Objectivity and<br>ethical neutrality can help cyber analysts determine the appropriate degree of monitoring.<br>Addressing the many facets of the digital divide: There are many communities that experience<br>marginalization and poverty that do not have access to the specific resources required for not<br>only effective cybersecurity, but also basic levels of internet security. Relativism and empathy<br>can help analysts grasp and work within those situations and address the gaps related to policy<br>and advocacy.<br>Applying ethical principles for data:<strong> <\/strong>Analysts often deal with sensitive data, data specific to<br>individuals or institutions, and are expected to handle it ethically, responsibly, or with the highest<br>ethics possible. Ethical neutrality and empiricism will help ensure that manner of reasoned<br>decisions will follow the facts and objective data analyses rather than interpretings or the<br>implications of an analyst&#8217;s latent biases or assumptions.<br>This underscores the importance of having a holistic perspective that goes beyond technical skill.<br>Using social science principles will better prepare analysts to engage these dilemmas with<br>equitable solutions.<br><strong>Conclusion: <\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Cybersecurity analysts are responsible for protecting not just digital systems but also everyone<br>that relies on a digital system. Their work draws on a number of social science principles that can<br>assist with ethical decision-making, understanding and analyzing behavior, and cultural<br>considerations. Applying relativism can provide greater inclusivity, while empirical statements<br>can help identify and clarify data-driven investigative steps. Overall, the ways in which social<br>science practices connect to cybersecurity are at the heart of how cybersecurity analysts do their<br>work in the digital world. The addition of social science practices into the cybersecurity toolkit,<br>can help cybersecurity analysts better do their job(s) and fulfill cybersecurity activities that serve<br>society as a whole, and in this case, fulfill that role equitably for those disproportionately<br>affected by society&#8217;s institutions. <\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Reference:<\/strong><br>Information Security Analyst career. (2024, September 16). Western Governors University.<br>https:\/\/www.wgu.edu\/career-guide\/information-technology\/information-security-analyst-career.ht<br>ml<br>Writers, S. (2023, March 20). Security Analyst Career Overview | Cyber Degrees. Explore<br>Cybersecurity Degrees and Careers | CyberDegrees.org.<br>https:\/\/www.cyberdegrees.org\/jobs\/security-analyst\/<br>Your next move: cybersecurity analyst. (2023b, July 7). CompTIA.<br>https:\/\/www.comptia.org\/blog\/your-next-move-security-analyst<\/p>\n\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Charles PhillipsProfessor Diwakar YalpiCYST 201S17 April, 2025The Role of Social Science Principles in the Career of a Cybersecurity AnalystBLUF: Just like in many of the disciplines of social science, cybersecurity analysis is complex,ethical, social, and technical. Cybersecurity analysts rely on their knowledge of social scienceprinciples in accounting for and managing the complexities in their daily&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cphil021\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":29864,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/pages\/346"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/users\/29864"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/comments?post=346"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/pages\/346\/revisions"}],"predecessor-version":[{"id":354,"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/pages\/346\/revisions\/354"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cphil021\/wp-json\/wp\/v2\/media?parent=346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}