Career Paper By Emmanuel Dade
A security analyst does more than just protect digital assets from cyber threats; they also manage and protect our online presence (Furnell, 2020). In order to comprehend the whole of cybersecurity—and, in turn, to better uphold its societal foundations—security analysts must extend their studies beyond the strict confines of the objectivity given to the fields of science and engineering. Yes, criminal and computer sciences remain integral to understanding the “who,” the “what,” and the “how” of cybercrime, but these fields alone do not provide a complete picture. “Why” is the question that provides the most profound comprehending when it comes to cybersecurity. And “why” is primarily a social science question.
One of the essential principles of criminology for a security analyst to know is understanding the motivation behind why people commit crimes. When security analysts know what makes someone engage in illegal activities like hacking, they can better predict what those kinds of people will do in the future. For example, the analysts might look at why someone might choose to hack a particular target and use that understanding to make educated guesses about what targets might get hit next. Or using another example, when security analysts know that certain people hack because they’re looking to gain wealth, power, or influence, then the analysts can look at potential hackers and guess which ones are likely to hack for those reasons. An important area for security analysis is anthropology. This helps the analysts understand cultural aspects that affect attackers as well as victims. Take data privacy. Countries differ vastly in their societal expectations about how private information ought to be handled, and these cultural nuances influence online security engagement by different populations.
In order to protect operations, security analysts use many kinds of cybersecurity concepts, including honeypots, victim behavior analysis, behavioral theories, and threat assessment. For example, honeypots are fake systems made to draw in fraudsters and offer insightful information about their tactics without endangering important assets. Analysts can improve defenses by better understanding the tactics and behavior of possible attackers by examining data from honeypots. An other crucial field is victim behavior analysis. By looking at how users could unintentionally expose themselves to cyberthreats, researchers can spot trends in dangerous behavior, which aids in the creation of systems and educational initiatives that promote safe online conduct. Behavioral theories, such the Social Learning Theory, are also useful in figuring out how cybercriminals can spread among groups, especially online forums where hacking methods are discussed. The final concept is social forces like the media, helps security analysts by informing them on coverages that boost their careers. An example of that would be being more aware of threats and getting a deeper understanding of the source of threat intelligence.
The connection between the career of a security analyst and marginalized groups is intricate. Security analysts often uphold the cyber integrity of our nation, playing a key role in safeguarding the less secure parts of our society (Sangar, 1970). Yet there are three big challenges at play here. The first is representation. Analysts come from a diverse array of backgrounds, but they’re not nearly as diverse as the communities they protect. The second big challenge is bias. What we see over and over again is that biases—subconscious or otherwise—that security analysts and the people that they report to hold, influence not only who gets hazed but also who gets protected. The third big problem is access. Cybersecurity is hard. It’s hard to learn because the fundamentals are complex and the landscape constantly shifts. And it’s particularly hard to learn for folks who come from marginalized communities and don’t have the privilege of a clear path into the field.
Works Cited
Furnell, Steven. “The Cybersecurity Workforce and Skills.” Computers & Security, Elsevier Advanced Technology, 14 Oct. 2020, www.sciencedirect.com/science/article/pii/S0167404820303539#section
Samtani, Sagar, et al. “Cybersecurity as an Industry: A Cyber Threat Intelligence Perspective.” SpringerLink, Springer International Publishing, 1 Jan. 1970, link.springer.com/referenceworkentry/10.1007/978-3-319-78440-3_8.
d1wqtxts1xzle7.cloudfront.net/59824115/fileserve20190621-114352-t667vq-libre.pdf?1561162015=&response-content-disposition=inline%3B+filename%3DAn_Analysis_on_Cyber_Crime_Cyber_Threats.pdf&Expires=1730177769&Signature=hGi8sbda7VIiK5HGs7QfKWhLxjSx7rJyvWm8z20pYnknsI2DgSChspVoMjCzjp14sOHSNZ5O0MqmaedZLjONSd~KhtjpiIY6w9T7t1bHasCnB06t82xS6-1G-iqAEQGIbA7xEoonTiqyL4GzDBwanyISyhAKsR5hVnebOG1Tu0Sgjxr7vTETYVya0vY9uR3x~2dxoYnHIvngt4VJ~ShV7HVnrO-RX4UvdQh~WKDoeZSMJZRNlwW7FH31D4jrebVVk2Ey2mmvJv-uAaNYCUvhTHwXX~vjshkyA8cutAwdjpX1lWt8zEq8gALh4bVL1fG2A-li1rDc