{"id":358,"date":"2025-04-30T03:12:44","date_gmt":"2025-04-30T03:12:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dymphine\/?page_id=358"},"modified":"2025-04-30T03:33:25","modified_gmt":"2025-04-30T03:33:25","slug":"career-paper-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dymphine\/career-paper-2\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Dymphine Ngabonziza<\/p>\n\n\n\n<p>Professor Yalpi<\/p>\n\n\n\n<p>Cybersecurity and the social science<\/p>\n\n\n\n<p>April 19, 2025<\/p>\n\n\n\n<p>Career Paper<\/p>\n\n\n\n<p>Information security analyst is a cybersecurity job where a person \u201cplans and carries out security measures to protect an organization\u2019s computer networks and systems\u201d (Information Security Analysts). It is an \u201centry level job where the analysts will work in computer companies, consulting firms, or business and financial companies\u201d (Information Security Analysts)(Staff). There are nearly 20,000 jobs openings on average yearly (Information Security Analysts). This paper will look at its job challenges, connections to society, marginalization, and social science principles that can be applied to the job.<\/p>\n\n\n\n<p><strong>Marginalized Groups<\/strong><\/p>\n\n\n\n<p>A challenge in the cybersecurity industry is the presence of marginalized groups. According to&nbsp; Allen, \u201cAnd yet, minorities are grossly underrepresented in the industry. According to the Aspen Digital Tech Policy report, only <a href=\"https:\/\/www.aspeninstitute.org\/wp-content\/uploads\/2021\/09\/Diversity-Equity-and-Inclusion-in-Cybersecurity_9.921.pdf\">9% of cybersecurity experts are Black<\/a>. About 8% are Asian and 4% are Hispanic\u201d.<\/p>\n\n\n\n<p><strong>Challenges<\/strong><\/p>\n\n\n\n<p>\u201cThe frequency of cyber attacks continues to rise, including phishing attacks, crypto-viral extortion, information threats, financial gains, and social engineering attacks, which are significant threats to information security\u201d (What are some challenges in information security?).<\/p>\n\n\n\n<p>Works Cited<\/p>\n\n\n\n<p><a href=\"https:\/\/how.dev\/answers\/what-are-some-challenges-in-information-security\">https:\/\/how.dev\/answers\/what-are-some-challenges-in-information-security<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\">https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.coursera.org\/articles\/cybersecurity-jobs\">https:\/\/www.coursera.org\/articles\/cybersecurity-jobs<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2022\/09\/30\/minorities-and-the-cybersecurity-skills-gap\/\">https:\/\/www.forbes.com\/councils\/forbestechcouncil\/2022\/09\/30\/minorities-and-the-cybersecurity-skills-gap\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dymphine Ngabonziza Professor Yalpi Cybersecurity and the social science April 19, 2025 Career Paper Information security analyst is a cybersecurity job where a person \u201cplans and carries out security measures to protect an organization\u2019s computer networks and systems\u201d (Information Security Analysts). It is an \u201centry level job where the analysts will work in computer companies,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dymphine\/career-paper-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29961,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/pages\/358"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/users\/29961"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/comments?post=358"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/pages\/358\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/pages\/358\/revisions\/370"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dymphine\/wp-json\/wp\/v2\/media?parent=358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}