{"id":12,"date":"2023-09-15T05:10:27","date_gmt":"2023-09-15T05:10:27","guid":{"rendered":"https:\/\/wp.pprd.odu.edu\/spring2017-met330-template\/?page_id=12"},"modified":"2023-12-05T05:21:42","modified_gmt":"2023-12-05T05:21:42","slug":"hw","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201morris\/hw\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n\n\n<h2 class=\"wp-block-heading\">Applying Key Concepts to Cybersecurity Analysts<\/h2>\n\n\n\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>A cybersecurity analyst is someone who protects company hardware and software from cybercriminals. It\u2019s the responsibility of the analyst to understand the company\u2019s IT infrastructure and monitor it to see and recognize threats that could affect the network while also improving the company\u2019s network security. There are many ways that analysts have to incorporate social science principles and research into their job.<\/p>\n\n\n\n<p><strong>Phishing and Social Engineering<\/strong><\/p>\n\n\n\n<p>Incorporation of social science principles play a very important role in combating phishing and social engineering attacks. Understanding concepts from psychology and sociology is vital in a cybersecurity analyst\u2019s understanding of how cyber criminals take advantage of people. It is through this that the analyst develops effective countermeasures to fight against them.<\/p>\n\n\n\n<p><strong>Incident Response and Communication<\/strong><\/p>\n\n\n\n<p>Being a cybersecurity analyst, you will be one of the first people to know when an incident has occurred within a company\u2019s IT infrastructure this will lead to you experiencing a plethora of incidents and having to your skills to find out how to fix it and prevent another one. Social science principles such as risk perception or crisis communication are just a couple of ways that cybersecurity analysts will have to incorporate social science principles.<\/p>\n\n\n\n<p><strong>User Behavior Analysis<\/strong><\/p>\n\n\n\n<p>Incorporating social science research can aid cybersecurity analysts understand user behavior. This is a crucial skill to have because when keeping watch over a company\u2019s IT infrastructure they have to be vigilant for any abnormal activities that can potentially be a security threat. By understanding patterns of behavior and recognizing when those patterns are broken, analysts can effectively recognize abnormalities and prevent future breaches in security.<\/p>\n\n\n\n<p><strong>Human Factors<\/strong><\/p>\n\n\n\n<p>Cybersecurity analysts need to incorporate social science research into their everyday lives to assess the impact of security policies and the technology of the company on the people there. Understanding this is imperative to create security systems that are user-friendly and efficient. Doing this will reduce the likelihood of human error.<\/p>\n\n\n\n<p><strong>Insider Threats<\/strong><\/p>\n\n\n\n<p>Social science principles are important to analysts in identifying insider threats. They have to remain vigilant and instantly recognize any insider that could pose a threat to security, then quickly develop a plan to mitigate the threat before it affects the company\u2019s IT infrastructure. Cybersecurity analysts should always be ready to develop these strategies to detect and respond to these threats.<\/p>\n\n\n\n<p><strong>User Friendly Security<\/strong><\/p>\n\n\n\n<p>It is important to the company that the cybersecurity analyst develops protocols and systems that are user friendly. Doing this incorrectly could lead to a lot of user error and the company having a slow period until everyone understands the protocols. The analyst must incorporate social science research and principles when creating these systems in order to not sabotage the company and keep things running smoothly.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>In conclusion, the incorporation of social science theories and research into cybersecurity methodologies improves analysts&#8217; capacity to handle the human element of security. By using a comprehensive approach, cybersecurity measures become more successful overall and contribute to the development of a more resilient and adaptable security posture.<\/p>\n\n\n\n<p><strong>Works Cited<\/strong><\/p>\n\n\n\n<ul>\n<li><a href=\"https:\/\/www.wgu.edu\/career-guide\/information-technology\/cybersecurity-analyst-career.html#close\"><strong>https:\/\/www.wgu.edu\/career-guide\/information-technology\/cybersecurity-analyst-career.html#close<\/strong><\/a><strong><\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/merge.rocks\/blog\/what-is-a-user-friendly-interface\"><strong>https:\/\/merge.rocks\/blog\/what-is-a-user-friendly-interface<\/strong><\/a><strong><\/strong><\/li>\n\n\n\n<li><a href=\"https:\/\/www.cai.io\/resources\/articles\/how-cybersecurity-practices-can-prevent-phishing\"><strong>https:\/\/www.cai.io\/resources\/articles\/how-cybersecurity-practices-can-prevent-phishing<\/strong><\/a><strong><\/strong><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Applying Key Concepts to Cybersecurity Analysts Introduction A cybersecurity analyst is someone who protects company hardware and software from cybercriminals. It\u2019s the responsibility of the analyst to understand the company\u2019s IT infrastructure and monitor it to see and recognize threats&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse201morris\/hw\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26273,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201morris\/wp-json\/wp\/v2\/pages\/12"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201morris\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201morris\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201morris\/wp-json\/wp\/v2\/users\/26273"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201morris\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyse201morris\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":86,"href":"https:\/\/sites.wp.odu.edu\/cyse201morris\/wp-json\/wp\/v2\/pages\/12\/revisions\/86"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201morris\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}