Michael A. Blanchard

CYSE201S

Professor Diwakar

04/10/2024

Revealing and Disclosing the Shadows: The Function of Cyber Threats and the analysts in ensuring and conforming the digital realm

  A cyber threat analyst, also referred to as a cyber intelligence as it identifies, and monitors, the overall cyber hazards that are caused by many different convicts, and other different malicious users (NICCS). A cyber threat critic will dispute these dangers, if necessary, through a variety of means. The overall purpose of a cyber danger analyst is to rescue their alliance or nation by helping them to know what they are up against and what could potentially harm them. Much of that learning and knowledge comes from the sociable sciences, as humans keep a hand in this as it must obtain in the ordinances of the sociable and colonial sciences.

The principles of the social sciences are essential for cyber hazards analysts to understand these hazards and just how dangerous they can be and how to avoid some but mainly most of these they are discovering and seeing. Almost if not all of these hazards come and thrive from all of these other people in one shape or another, the colonial and sociable sciences are required and vital. The regulations include relativism, objectivity, parsimony, empiricism, ethical objectivity, determinism and so much more and etc. Cyber danger critics must operate each of these in their work in order to be effective and just be better when it comes down to it the need to have this knowledge and be able to handle these jobs and responsibilities. Relativism is important because they must be able to see and determine how threats are related because they normally are. More often than not, a threat would not be a threat to an organization if it is not related to them in some way. Objectivity is used through the analysts staying fact and logic-based, not factoring in their subjective opinions unless it is necessary and based in fact and logic.

Parsimony is very influential and meaningful, as they have to develop their danger assessments in a manner that is straightforward, understandable, and reasonable in length (Baker, 2023). What is also needed is Empiricism now as this is needed, as they have to work and contain evidence to help reinforce these menaces being major hazards as these are very dangerous. During their work, threat analysts must also remain ethical and neutral, ensuring to not violate laws and other ethical guidelines. Determinism is often shown and displayed via the need to comprehend one-time occurrences that will happen in the past and how they relate to current situations and perils. Much of being a cyber threat analyst needs to contain knowledge and being able to utilize different concepts in the sociable sciences. One such concept is the psychology of people who are possible hazards.

A threat analyst must understand what drives a potential cyber threat so they know how much of a threat they pose, what kind of threat they pose, and what needs to be done to counter it. They can employ the use of multiple schools of psychology to understand this and to think like a criminal might (. Another important concept they must understand is target and prey precipitation. Furthermore, with target showers, how they may comprehend and look at different mortal elements in cybersecurity. How humans and machines interact, what works and what does not, and what could be a threat from the human factor is very important to know. Furthermore, these analysts must have knowledge of the civilizations and subcultures covering cybersecurity.

The outcome of a cyber threat critic is often used and connected in some ways to marginalized crowds and the challenges they face. One such challenge is there is more risk rising every day when it comes down to certain cyber dangers. If the cyber threat analyst’s association is made up of these marginalized classes, they may be at more dangers than others as this is a serious problem because you are in more danger than others as you or likely the number one target for them. Additionally, threat analysts might come past a lot more dangers from certain diminished stations due to them being put at risk to certain cyber actions due to life conditions. The next hurdle includes how they encounter concerns marginalized groups is having less resources available to them. They may not have the same resources to learn and grow as a cyber threat analyst if they are part of a diminished status. These tough hurdles can often help to show how cyber threat analysis relates to society. Despite it being something most do not think of, or even know exists, or that this is very serious to business and is very crucial to them.

Cite: Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610-613.

Cyber Intelligence Analyst Salary & Job Description. (2020, August 7). University of North Dakota Online; University of North Dakota. https://onlinedegrees.und.edu/blog/cyber-intelligence-analyst-salary-job-description/

Threat Analysis | NICCS. (n.d.). Niccs.cisa.gov; Cybersecurity and Infrastructure Agency. Retrieved April 5, 2023, from https://niccs.cisa.gov/workforce-development/nice-framework/specialty-areas/threat-analysis