{"id":238,"date":"2024-04-22T16:23:54","date_gmt":"2024-04-22T16:23:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/?p=238"},"modified":"2024-04-22T16:23:54","modified_gmt":"2024-04-22T16:23:54","slug":"cybersecurity-career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/2024\/04\/22\/cybersecurity-career-paper\/","title":{"rendered":"Cybersecurity Career Paper"},"content":{"rendered":"\n<p><br>Justin DeLoach<br>6 March 2024<\/p>\n\n\n\n<p><br>Relation of Social science principles to Cybersecurity:<br>I have selected the career path of Digital Forensic Analyst. This specific career path<br>relies on social science and its principles in many ways. First off it helps with understanding<br>human behavior, this is due to the meaningful insights that come from understanding these<br>interactions. Whether it be insights into human behavior or the motivations for one&#8217;s cyber<br>crimes, by understanding how people behave and think online, analysts are able to better<br>understand the digital evidence they are presented with. Not only does it help with<br>understanding human behavior but it also helps Digital Forensic Analysts prepare for taking on<br>the challenge that is social psychological profiling. By understanding the basis of social<br>sciences, analysts are able to create profiles of suspects of related cyber crimes based on their<br>digital behavior and footprint.<\/p>\n\n\n\n<p><br>Cybersecurity Concepts:<br><\/p>\n\n\n\n<p>Multiple Key Concepts are used within the world of digital forensic analysis to make sure<br>they can properly make an investigation. After the investigation the results can be used to stop<br>future cyber incidents before they happen. One of the major ways that analysts utilize<br>cybersecurity concepts is through their vigilance in incident response. They are able to use their<br>knowledge of prior or prominent cybersecurity events to create important incident response<br>measures. This way they are able to properly respond as they have procedures to handle and<br>contain any security incidents that come their way. Analysts are also able to use the concept of<br>vulnerability assessment to analyze their networks and figure out where script kittens and<br>violent invaders get into their frameworks. By adding these cybersecurity concepts into the<br>analysts day to day inspections, they are able to effectively investigate any issues that come<br>their way.<\/p>\n\n\n\n<p><br>Effects on marginalized groups:<br><\/p>\n\n\n\n<p>The adoption of cybersecurity and the job of digital forensic analysts face several rough<br>complexities across the board. Due to the limited amount of awareness and education<br>possibilities available the to populace , the cybersecurity work space in africa are not very<br>prominent. This is because Africa lacks awareness almost as a whole about the threats that<br>come along with building a cyber space across their country that is openly available and<br>protected. Not only that but the resources available to possible cybersecurity professionals are<br>limited. The financial support and technical knowledge are hard to find. This makes relatively<br>small organizations have a hard time creating the required infrastructure to protect their digital<br>systems and online enterprises.<\/p>\n\n\n\n<p><br>Connections between Society and being a Digital Forensics Analyst<br><\/p>\n\n\n\n<p>There are plenty of connections between society and being a digital forensic analyst. For<br>example the social impact that analysts have on investigating cybercrimes is very important.<br>With their help, things such as identity theft and financial fraud can be looked into properly. And<br>once evidence is uncovered the analysts are able to identify the people who do these types of<br>crimes and enhance the public view on their digital presence. Digital forensics analyst also play<br>a major part in cybersecurity education. Due to their particular role in protecting against certain<br>threats, they are able to advise against how to interact online and what to put online regarding<br>themselves. By sharing their insights they are able to educate the public on what risks they are<br>susceptible to and help empower people to protect themselves against cyber threats.<br><\/p>\n\n\n\n<p>Citations:<br>Ahmadi, S. (2024, February 27). Systematic literature review on cloud computing security<br>threats and mitigation strategies. SCIRP.<br>https:\/\/www.scirp.org\/journal\/paperinformation?paperid=132024<br>Molitor, D., Saharia, A., Raghupathi, V., &amp; Raghupathi, W. (2024, February 27). Exploring<br>the characteristics of data breaches a descriptive analytic study. SCIRP.<br>https:\/\/www.scirp.org\/journal\/paperinformation?paperid=132269<br>Nibigira, N., Havyarimana, V., &amp; Xiao, Z. (2024, February 27). Artificial Intelligence<br>Adoption for cybersecurity in Africa. SCIRP.<br>https:\/\/www.scirp.org\/journal\/paperinformation?paperid=131891<br>Tahmasebi, M. (2024, February 27). Cyberattack Ramifications, the hidden cost of a<br>security breach. SCIRP. https:\/\/www.scirp.org\/journal\/paperinformation?paperid=131678<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Justin DeLoach6 March 2024 Relation of Social science principles to Cybersecurity:I have selected the career path of Digital Forensic Analyst. This specific career pathrelies on social science and its principles in many ways. First off it helps with understandinghuman behavior,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/2024\/04\/22\/cybersecurity-career-paper\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28356,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/238"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/users\/28356"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/comments?post=238"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/238\/revisions"}],"predecessor-version":[{"id":239,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/posts\/238\/revisions\/239"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/media?parent=238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/categories?post=238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-201s-deloach\/wp-json\/wp\/v2\/tags?post=238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}