{"id":231,"date":"2024-12-11T02:24:36","date_gmt":"2024-12-11T02:24:36","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=231"},"modified":"2024-12-11T03:20:27","modified_gmt":"2024-12-11T03:20:27","slug":"ece-416","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/epjkind\/ece-416\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>Career Paper Cyber Security Analyst<br><\/strong><\/p>\n\n\n\n<p><strong>What is a cyber security analyst?<br><\/strong>A cyber security analyst is an IT professional who protects information systems from cyber<br>threats \u201cwhose primary responsibility is to safeguard data integrity, confidentiality, and<br>availability by monitoring, detecting, and responding to security incidents.\u201d(Duggal 2024).<br><\/p>\n\n\n\n<p><strong>How does the job relate to social sciences?<br><\/strong>\u201cThe cybersecurity analyst thoroughly understands cyberattacks, malware, and the behavior of<br>cybercriminals, and actively seeks to anticipate and prevent these attacks\u201d.(WGU 2024). One of<br>the ways a cyber security analyst relates to the social sciences principles of cybersecurity is<br>when analysts must understand the behavior of cybercriminals. Analysts use sociology for<br>behavior analysis of these criminals to accurately try to protect what they would decide. Another<br>way cybersecurity analysts relate to the social sciences is understanding victim decision<br>making, using psychology to develop strategies that might lessen someone&#8217;s victimization rate.<br><\/p>\n\n\n\n<p><strong>Key concepts from class?<br><\/strong>Cybersecurity analysts relate to risk assessment as we talked about in class risk assessments<br>are not determined by people and not by technology. Another key concept for cyber security<br>analysts is victimization. Cyber security analysts are able to determine someone&#8217;s victimization<br>rate by analyzing their decision they make while traversing the internet. Cyber Security analysts<br>when dealing with cyber criminals will try to determine the individual motives as discussed in<br>class to better understand why they are committing the crime to quickly respond and resolve it.<br>Conflict theory discussed in class relates to the power struggle between cyber criminals and cyber security analysts because they are in a constant state of conflict, one trying to cause<br>conflict while the other trying to stop it.<\/p>\n\n\n\n<p><br><strong>Cyber Security analysts and marginalized groups?<br><\/strong>Marginalized groups like female africans americans might have a harder time getting into<br>careers like cyber security analysts because of barriers they might face but groups like black<br>girls who code have changed the landscape and made careers fields within technology more<br>accessible to female african americans. Another marginalized group that might have a hard time<br>getting into the career field are low income individuals because most of the time these jobs<br>require bachelor&#8217;s degrees but things like cybersecurity bootcamps that cost less then going to<br>college for 4 full years help low income inducals even the playing field when it comes to<br>education. Some algorithms might have bias against marginalized groups. AI based tools might<br>be different in different races. The only way to solve this is to allow more marginalized groups<br>into the fields to allow for more perspectives in the field.<br><\/p>\n\n\n\n<p><strong>Conclusion: how do cybersecurity analysts affect society?<br><\/strong>\u201cThey help to protect organizations and help them address network and system breaches when<br>they occur. Part bodyguard and part rescuer, the cyber security analyst has the power to defend<br>a company against attack and come to the rescue during times of need.\u201d(Post university 2024).<br>For anyone wanting a meaningful career in cybersecurity cybersecurity analysts is the perfect<br>job. As society becomes more and more reliant on technology this career field will only become<br>more and more important. Everyday tasks like shopping, working, and social interaction are<br>becoming digitalized and are going to continue to be attacked by cyber attacks by cyber<br>criminals and cyber security analysts will continue to combat those criminals constantly evolving<br>and adapting.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>References<br><\/strong>Duggal, N. (2024, October 9). How to become a Cyber Security Analyst: Start your<br>career!. Simplilearn.com.<br><\/p>\n\n\n\n<p>https:\/\/www.simplilearn.com\/what-is-a-cyber-security-analyst-article<br>Harrington, D. (2024, November 14). Decoding the role: What does a cyber security<br>analyst do?. Post University. https:\/\/post.edu\/blog\/what-does-a-cyber-security-analyst-do\/#:~:text=They%20help<br>%20to%20protect%20organizations,rescue%20during%20times%20of%20need.<br><\/p>\n\n\n\n<p>What does a cybersecurity analyst do?. Western Governors University. (2024, September<br>16).<br>https:\/\/www.wgu.edu\/career-guide\/information-technology\/cybersecurity-analyst-ca<br>reer.html<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Career Paper Cyber Security Analyst What is a cyber security analyst?A cyber security analyst is an IT professional who protects information systems from cyberthreats \u201cwhose primary responsibility is to safeguard data integrity, confidentiality, andavailability by monitoring, detecting, and responding to security incidents.\u201d(Duggal 2024). How does the job relate to social sciences?\u201cThe cybersecurity analyst thoroughly understands&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/epjkind\/ece-416\/\">Read More<\/a><\/div>\n","protected":false},"author":30195,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/pages\/231"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/users\/30195"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/comments?post=231"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/pages\/231\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/pages\/231\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/epjkind\/wp-json\/wp\/v2\/media?parent=231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}