{"id":327,"date":"2023-04-26T01:30:15","date_gmt":"2023-04-26T01:30:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/?page_id=327"},"modified":"2023-04-26T01:34:13","modified_gmt":"2023-04-26T01:34:13","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>There are many careers in the cybersecurity field, for this paper we will be focusing on one career which is a cybersecurity analyst. In the case of cybersecurity analysts, they use social science research in order to identify, counter, and assess the impact of a threat to their employer. Cybersecurity analysts need to have knowledge of social science principles like psychology, criminology, sociology, political science, economics, etc. Some of the reasons why social science principles are required are because they need to understand human behavior (how we think, feel, and behave). Although being in the cybersecurity field may sound interesting and fair it also has its faults. There are many controversies and unfairness in the cybersecurity field that can affect those who are working as cybersecurity analysts. Marginalized groups may be more likely to suffer due to the fact that not everyone is treated equally. Among the groups that are underrepresented in the cybersecurity field are Blacks, who account for only 9% of experts, Asians, who account for 8%, and Hispanics, who account for 4%. Another challenge that is faced in the cybersecurity field can be the lack of mentorships and role models. The lack of role models and mentors, it affects the number of people who have heard of certain jobs in cybersecurity. For children and adults who have limited financial resources, it may be difficult for them to access certain skills that they might need. For example, the CompTIA A+ certification costs around $350. Those who are from low-income households won&#8217;t be able to take IT courses. Cybersecurity analysts impact society by helping people from falling into being a victim to cyber attacks such as hacking. It is possible for them to work with both government and business. Having a cyber security analyst protects your computer networks and systems, not just the information they contain, but also the information contained on them. Monitoring for potential attacks and responding to active threats are among the proactive measures they take to strengthen their networks and systems against attacks. The importance of cybersecurity analysts comes from the fact that they must develop and implement disaster recovery plans, which include measures such as backing up data and storing it away from the main network in the event of an attack.<br><\/p>\n\n\n\n<p class=\"has-text-align-left\">Sources<br>Allen, B. (2022, October 12). Council post: Minorities and the Cybersecurity Skills Gap. Forbes.<br>Retrieved April 16, 2023, from https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/09\/30\/minorities-and-the-cybersecurity-skills-gap\/?sh=313026257f3f<br>Mind, CY., Pineau, C. (2021, September 2). Social Science and cybersecurity: A key challenge<br>for the future. InCyber. Retrieved April 16, 2023, from https:\/\/incyber.org\/en\/social-science-and-cybersecurity-a-key-challenge-for-the-future\/<br>(n.d.). What does a cybersecurity analyst do? GCU. Retrieved April 16, 2023, from https:\/\/www.gcu.edu\/blog\/engineering-technology\/what-does-cybersecurity-analyst#h-what-do-cybersecurity-analysts-do-in-day-to-day-work<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many careers in the cybersecurity field, for this paper we will be focusing on one career which is a cybersecurity analyst. In the case of cybersecurity analysts, they use social science research in order to identify, counter, and assess the impact of a threat to their employer. Cybersecurity analysts need to have knowledge&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":24717,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages\/327"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/users\/24717"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/comments?post=327"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages\/327\/revisions"}],"predecessor-version":[{"id":331,"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/pages\/327\/revisions\/331"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/irma-cyse201s\/wp-json\/wp\/v2\/media?parent=327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}