{"id":375,"date":"2023-07-18T14:31:25","date_gmt":"2023-07-18T14:31:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/?p=375"},"modified":"2023-07-18T14:31:25","modified_gmt":"2023-07-18T14:31:25","slug":"career-professional-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/career-professional-paper\/","title":{"rendered":"Career Professional Paper"},"content":{"rendered":"\n<p>Donte Staves<\/p>\n\n\n\n<p>Professor Duvall<\/p>\n\n\n\n<p>April 18, 2023<\/p>\n\n\n\n<p>Cybersecurity Specialist Career Professional Paper<\/p>\n\n\n\n<p>A cybersecurity specialist plays a very key role in actively securing information just like all other cybersecurity roles do. They have other names that they can be referred to as well, such as information security specialist and cybersecurity professional. According to CompTIA, the role of a cybersecurity specialist is to \u201cdetect cyberthreats and implement changes to protect an organization\u201d. In which they typically work in teams that most likely have multiple levels of cybersecurity specialists that have responsibilities of observing, managing, mitigating, and repairing IT threats. They have the possibility of being assigned to installing, regulating, and diagnose security solutions. They also can write up security guidelines and training forms for their associates.<\/p>\n\n\n\n<p>Cybersecurity specialists depend on and require social science research in their field of work. The type of research used in the field is multi method research. This is applied by them using archival research, questionnaires and interviews. They use these research methods in order to gather information from people. As (Baskerville et al.) states \u201cour primary source of data includes interviews and documents on the organizational environment and information security management practices.\u201d In which they also conducted interviews with senior information security managers. With the use of archival research, they look at companies who have had number of records in data spills of companies such as Yahoo, River City Media and Exactis. With the use of a questionnaire (Pollini et al.) states \u201cThe Human Aspects of Information Security Questionnaire (HAIS \u2013 Q) builds upon hypothesis that as computer users\u2019 knowledge of cybersecurity policy and procedures increases, their attitude and beliefs towards information security policy and procedures improves, which should translate into more risk-averse information security behaviour.\u201d These different methods of research give them various amounts of data to help prevent any attacks that could happen.<\/p>\n\n\n\n<p>Principles in social science are also shown in this field. Some of which are parsimony, ethical neutrality, and determinism. These principles are required and depended on because it is best and easiest to describe their job as prevention and finding solutions for cyber-attacks. There are ways to stay within a company\u2019s guidelines when they are conducting research to provide solutions for certain situations. As (Baskerville et al.) states \u201cComplicating the risky nature of new technologies is an innate contradiction. It lies between the particularly valuable system features, such as operability\/functionality, and security features, such as operability\/functionality, and security features that attempt to confine behaviors along allowable lines.\u201d As well as potential risks in the company and because of that they then become victims to cyberattacks which cybersecurity specialists then are responsible for preventing, detecting, and responding to. Cybersecurity specialists relate to marginalized groups because there is an underrepresentation of races in the field. They relate to society because they serve as protection for businesses and people.<\/p>\n\n\n\n<p>Works Cited<\/p>\n\n\n\n<p>Baskerville, Richard L, et al. \u201cThe Cybersecurity Risk Estimation Engine: A Tool for Possibility Based Risk Analysis.\u201d&nbsp;<em>Computers &amp; Security<\/em>, Elsevier Advanced Technology, 29 May 2022, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S016740482200147X.&nbsp;<\/p>\n\n\n\n<p>Baskerville, Richard, et al. \u201cIncident-Centered Information Security: Managing a Strategic Balance between Prevention and Response.\u201d&nbsp;<em>Information &amp; Management<\/em>, North-Holland, 19 Nov. 2013, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0378720613001171.&nbsp;<\/p>\n\n\n\n<p>\u201cCybersecurity Specialist Career Path: Job Description &amp; Salary: CompTIA.\u201d&nbsp;<em>CompTIA<\/em>, https:\/\/www.comptia.org\/content\/it-careers-path-roadmap\/cybersecurity-specialist.&nbsp;<\/p>\n\n\n\n<p>Pollini, Alessandro, et al. \u201cLeveraging Human Factors in Cybersecurity: An Integrated Methodological Approach &#8211; Cognition, Technology &amp; Work.\u201d&nbsp;<em>SpringerLink<\/em>, Springer London, 11 June 2021, https:\/\/link.springer.com\/article\/10.1007\/s10111-021-00683-y.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Donte Staves Professor Duvall April 18, 2023 Cybersecurity Specialist Career Professional Paper A cybersecurity specialist plays a very key role in actively securing information just like all other cybersecurity roles do. They have other names that they can be referred to as well, such as information security specialist and cybersecurity professional. According to CompTIA, the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/2023\/07\/18\/career-professional-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":25260,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/375"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/users\/25260"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/comments?post=375"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/375\/revisions"}],"predecessor-version":[{"id":376,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/posts\/375\/revisions\/376"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/media?parent=375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/categories?post=375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/donte-cybersecurity\/wp-json\/wp\/v2\/tags?post=375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}