An Information Security Analyst better known as (ISA)? “This is an individual who is responsible for protecting an organization’s computer systems and networks. They monitor for security breaches, investigate violations and install security software” (Bhagwat).The job description of being an ISA follows many social sciences principles, to include human behavior and psychology. Understanding human behaviors is crucial in cybersecurity and ISA. Social engineering attacks, such as phishing, rely on manipulating human psychology to mislead individuals into disclosing sensitive information or performing actions that compromise security. Information Security Analysts study behavioral patterns to anticipate potential vulnerabilities and design security measures that account for human factors. ISAs are also concerned with cultural context and diversity. In cybersecurity, it is important to remember that different people and groups have different beliefs and ways of doing things. Information Security Analysts know that these differences can affect how people view and use technology securely. By considering these differences, analysts can make security measures that work better for everyone. This means that cybersecurity can protect a wider range of people and groups effectively.
Human factors is one specific concept that we covered in class that relates to ISAs. For example user behavior, the way people use technology and follow security rules is greatly affected by human factors. ISA looks into how people behave to grasp their views on security threats, how they feel about security actions, and how likely they are to stick to security guidelines. “Acknowledging the role of human behavior in cybersecurity allows analysts to create easy to use systems, offer specific training, and put in place strategies that encourage safe online habits” (Lau). Another concept that we discussed in class that relates to ISAs is relativism. Linking ISA to relativism means they understand that what is right or effective in cybersecurity can vary based on culture, ethics, and the situation. “Relativism is the idea that there’s no one-size-fits-all truth” (Umam). This affects how security rules and actions are set up and seen differently around the world.
Individual motives is another concept that we learned in class is individual motives. It is important to understand why someone inside a company might become a threat. It may be that the employee is after more money or that they are generally unhappy at work. By figuring out these reasons, security experts can set up specific defenses like limiting access to important information, watching employee activities, and making sure employees are happy at work. This helps stop such threats before they cause harm. The last relevant concept as it relates to ISA is cyber criminology. Cybercriminology helps us understand how hackers and cybercriminals do their dirty work, like hacking into systems or tricking people with phishing emails. When ISA knows these tactics, they can make stronger plans to protect companies from new kinds of attacks. It is like having a cheat sheet to outsmart the bad guys in the digital world.
Marginalized groups “within information Security Analysts can stand up for groups of people who are often left out in the tech world, like people of different races, women, LGBTQ+ members, and those with disabilities” (Do). Industries might try to make workplaces more welcoming for everyone, encourage companies to hire more diverse staff, and help mentor and guide people from these groups who want to work in cybersecurity. It is about making sure everyone gets a fair chance to succeed in the field.
Information Security Analysts serve a great purpose for society in many ways. By protecting our sensitive information, ISAs keep important information from falling into the wrong hands. By stopping hackers and cyberattacks, they prevent bad things like losing money, having their identity stolen, or facing other problems that can happen when information gets into the hands of criminals. Information Security Analysts also encrypt to “help keep your private stuff safe online. They put locks and security measures in place to make sure only the right people can access your personal information” (Shrobe). This way, you have control over who sees your data, which is really important in today’s digital world where everything is online.
In conclusion, Information Security Analysts play a pivotal role in safeguarding computer systems and networks. More importantly, ISAs use encryption to keep the everyday individual safe from threats. They use knowledge from social sciences, like understanding how people think and act, to fight against attacks like tricking people into giving away sensitive information. They also pay attention to different cultures and groups to make sure security measures work for everyone. They look at things like how people behave, different viewpoints, why someone might do something bad, and how cybercriminals operate to keep everything safe. ISAs are like superheroes and they use all these different tools to keep our enemies out of the digital world.
Work Cited
Bhagwat, Vineet, and Xiaoding Liu. “The Role of Trust in Information Processing: Evidence from Security Analysts.” The Accounting Review, vol. 95, no. 3, 2020, pp. 59–83, doi:10.2308/accr-52524.
Do, Stephanie, and Dan Nathan-Roberts. “What Is the Relationship Between Online Sex Workers and Cybersecurity?” Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 65, no. 1, 2021, pp. 762–66, doi:10.1177/1071181321651304.\
Lau, Nathan, et al. “Human Factors in Cybersecurity – Perspectives from Industries.” Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 62, no. 1, 2018, pp. 139–43, doi:10.1177/1541931218621032
Shrobe, Howard, et al. “INTRODUCTION Cybersecurity and Society.” New Solutions for Cybersecurity, MIT Press, 2018, doi:10.7551/mitpress/11636.003.0001.
Umam, Sulkhanul. “Is the Cyber Security Awareness Perspective Different?” Journal of Business and Management Review, vol. 1, no. 6, 2020, pp. 425–35, doi:10.47153/jbmr16.772020.