Michael A. Blanchard

CYSE201S

Professor Diwakar

05/1/2024

Revealing and disclosing the shadows the purpose and task of cyber threats and the analysts

  For my career paper, I have chosen to pick cyber threat analyst/ cyber analyst as my career choice. As these professionals will often find different ways to resolve issues and problems that will occur and will have many different situations with others’ data and info as they will continue to lower the amount and percentages of breaches there are of taking people’s identity and money as well making this a huge problem not to mention white collar crime is higher than street crime but more peoples focus shift to that because not many know about the crimes and seriousness of breaches and how their protection is in jeopardy. So these cybersecurity analysts are knowledgeable individuals look at and talk about different computer systems for these breaches as it is known to be a big problem not with just pedestrians on citizens’ information but also with big enterprises and businesses as well as these breaches are taking away a lot of valuable information financial, medically, and identities as well as they will also try their best to remove the breaches that had recently occurred and build more protection for others and their information and data as well. A cyber threat analyst has a lot of cyber hazards that are caused by many different convicts, and other different users that will often use their knowledge for bad and taking data from others.

Some key concepts that relate to this career paper based on cyber analyst hazards and etc is Concepts from Class Applied to Cyber Threat Analysis form this class is for starters understanding human behavior is one key concept from class as cyber analysts will often use social science analyzation as a crutch to have more knowledge on the topic of the situation with humans and how they will often react to different situation and hardships that they will face as this will play a part in cyber invasions and breaches being made  mainly going for personal info and many hurdles they face as many cybersecurity analysts/cybersecurity threats analysts can predict when an attack is more planned to happen with the knowledge they have and knowing the ins and out. Another key connection that was discussed in class is ethical decision-making as this is sociable deliberation in many different cyber analysis and cyber threat analyzes as finding data and doing research plays a huge crucial role in this field for cyber threat analysis and cyber analysis. As the employees must follow the rules when it comes down to protecting one or a businesses information and private information that will or cannot be looked at or released and etc it is crucial that they must follow directions loud and clear and no mistakes will be made while in the cyber field.

One more key concept from class is cultural awareness as these elements are only going to help progress to help inspire other in the field of cyber and this will grow more of a tradition in threat awareness as they will have more of a grasp and hands on work when it co,mes down to it. As they often have to be ready for when something strikes for example a breach they have to be on top of ot and quick to continue to help others with information and safeguarding it so nothing gets out and keeping information and or a company secure. Understanding cultural differences in tech today will only enrich shielding and defense.  The final key concept is human-centric design as cyber analysts play a huge role in coming up with safety for defenses when it comes down to human-centric design as this is taking alot of time and problem-solving, service and system design, and engineering frameworks as this isn’t a easy task to complete or overcome. Social science principles of HCI will often tell threat analysis.  The analysts will make sure that their job is done and everything is fine and nothing is wrong and will have no bugs and everything is up to date as well with data and etc.

So now to talk about the Marginalization of this career paper and the cyber threat analysis/cyber threat analysis come into contact with societal problems, also referred to an out of proportion bumping and clashing with all of these cyber hazards on these marginalized groups. Socially viewpoints and takes and opinions will often aid analysts in identifying and address cybersecurity challenges when faced with adversities and hardships. Cyber threat analysis/cyber threat analysis can help with community organizations to close these potholes in the road and bring in more knowledge on cyber threat analysis/cyber threat analysis and how it can bring traditional practices.

There are some complexities such as with the threat and defense and just how knowledgeable they have to be to take on these task on the risk that come with the job as the goal and plan is to bring more attention to the situation that is being dealt with at hand and just how much of a wreck this can cause, there is some concerns when it comes to comprehending about these breaches and hazards and the safeguard components as this can lower the overall amount of analysts’ effectiveness. As it states that from the source “The increasing connectivity of IT infrastructure has rendered actors more vulnerable to both directed and undirected cyberattacks. Their effects may range from threatening the foundation of modern information society by paralyzing the national-wide network and obstructing e-commerce, to causing catastrophic failure of nation-wide information infrastructure which most developed nations now rely upon to govern and run a country. These risks are not only theoretical; serious effects can be observed in industry and governance that demonstrate the need to advance our nations’ and organizations’ cyberdefences [1]”.

  In conclusion, the integration of social science research and principles is essential for cybersecurity analysts to find their roles in this field of cyber. They are finding a connect between humans and this tech and with this being combined they are protecting both as they are safeguarding humans info and continuing to find new ways on overcoming the situations of breaches happening and how it can be lowered and how these cybersecurity analysts are able to do their job what they do and how they do it and overall how can they manage cybersecurity analysts can enhance security measures while promoting comprehensiveness and equity in the digital field. Now with the connection with cyber professionals and sociable scientists is pretty critical to talk about creating some hazards that will be tough to overcome, as the overall goal is to turn these breaches around and find a more reliable and safe way to keep breaches from happening to people and big corporations, business, and enterprises but not bovine big companies like so but also small as they are just as much as a threat if not more as their security is not going to be better than bigger one for example apple security is significantly better than insomniac games as a result they were breached late last year.

Cite: Johnson, M., & Lee, S. (2018). Designing Inclusive Security Systems: Integrating Human-Centric Principles. International Journal of Human-Computer Interaction, 34(4), 387-400.

J. M. Ahrend, M. Jirotka and K. Jones, “On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge,” 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), London, UK, 2016, pp. 1-10, doi: 10.1109/CyberSA.2016.7503279.

The Palgrave Handbook of International Cybercrime and Cyberdeviance, 2020

ISBN : 978-3-319-78439-7

Sagar Samtani, Maggie Abate, Victor Benjamin,

N. Sun et al., “Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives,” in IEEE Communications Surveys & Tutorials, vol. 25, no. 3, pp. 1748-1774, thirdquarter 2023, doi: 10.1109/COMST.2023.3273282. keywords: {Surveys;Computer hacking;Soft sensors;Taxonomy;Organizations;Tutorials;Malware;Cybersecurity defense;cyber threat intelligence;data mining;natural language processing;machine learning},