{"id":328,"date":"2025-08-07T09:02:27","date_gmt":"2025-08-07T09:02:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/?p=328"},"modified":"2025-08-07T09:17:51","modified_gmt":"2025-08-07T09:17:51","slug":"cyse-201s-module-10-journal-entry-1","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/08\/07\/cyse-201s-module-10-journal-entry-1\/","title":{"rendered":"CYSE 201S Module 10 Journal Entry 1                Social Themes in Cybersecurity Jobs"},"content":{"rendered":"\n<p> The job of a cybersecurity analyst, may intrinsically connect many social behaviors and.  <\/p>\n\n\n\n<p>many human factors that might affect cybersecurity risks and results, incorporating<\/p>\n\n\n\n<p>various social themes. It is clear that it is crucial to comprehend and understand the<\/p>\n\n\n\n<p>variations of social cybersecurity. The focus and emphasis in addressing and<\/p>\n\n\n\n<p>recognizing the social and human aspects of cyberthreats is imperative and very<\/p>\n\n\n\n<p>diversely unique, that one of the main themes is collaborations within companies and<\/p>\n\n\n\n<p>people. Trust and cooperation are essential for the success of the cybersecurity world.<\/p>\n\n\n\n<p>Because the job of a cybersecurity analyst must make critical decisions that may affect<\/p>\n\n\n\n<p>the security, and privacy of people and communities, the work emphasizes the value of<\/p>\n\n\n\n<p>moral and ethical behavior and accountability. Cyberthreats are evolving in real time in<\/p>\n\n\n\n<p>front of our eyes, so the job requires a really good network of people that are connected<\/p>\n\n\n\n<p>for the same goal, the same motivation to be ahead of this game. Additionally, the job<\/p>\n\n\n\n<p>required a constant emphasis of education and communication, learning does not stop<\/p>\n\n\n\n<p>and it required multiple levels or training, education and certifications to be able to be<\/p>\n\n\n\n<p>considered for an entry level position.<\/p>\n\n\n\n<p>To conclude, the work of a cybersecurity analyst is vast, it might come in many different<\/p>\n\n\n\n<p>titles, but it&#8217;s mostly the same work depending on the company that you are working for.<\/p>\n\n\n\n<p>It intricately links to many social issues, it focuses on transparency, training, ethics, vast<\/p>\n\n\n\n<p>cooperations, flexibility and adaptability of challenges to be able anticipate and prevent<\/p>\n\n\n\n<p>cyberattacks. On the plus side, the job comes with a good, better than average salary.<\/p>\n\n\n\n<p>References:<\/p>\n\n\n\n<p>ENESSE, N. (n.d.). YouTube. https:\/\/www.youtube.com\/watch?v=iYtmuHbhmS0. What<\/p>\n\n\n\n<p>does a Cybersecurity Analyst Do? Salaries, Skills &amp; Job Outlook<\/p>\n\n\n\n<p>Mulahuwaish, A., Qolomany, B., Gyorick, K., Abdo, J. B., Aledhari, M., Qadir, J., Carley,<\/p>\n\n\n\n<p>K., &amp; Al-Fuqaha, A. (2025). A survey of social cybersecurity: Techniques for attack<\/p>\n\n\n\n<p>detection, evaluations, challenges, and future prospects. <em>Computers in Human Behavior<\/em><\/p>\n\n\n\n<p><em>Reports<\/em>, <em>18<\/em>, 100668. https:\/\/doi.org\/10.1016\/j.chbr.2025.100668<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The job of a cybersecurity analyst, may intrinsically connect many social behaviors and. many human factors that might affect cybersecurity risks and results, incorporating various social themes. It is clear that it is crucial to comprehend and understand the variations of social cybersecurity. The focus and emphasis in addressing and recognizing the social and human&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/08\/07\/cyse-201s-module-10-journal-entry-1\/\">Read More<\/a><\/div>\n","protected":false},"author":30571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/328"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/users\/30571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/328\/revisions"}],"predecessor-version":[{"id":347,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/328\/revisions\/347"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/categories?post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/tags?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}