{"id":296,"date":"2024-12-07T15:04:02","date_gmt":"2024-12-07T20:04:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/johntrout\/?p=296"},"modified":"2024-12-07T15:04:02","modified_gmt":"2024-12-07T20:04:02","slug":"combining-tech-with-social-sciences-as-a-cybersecurity-analyst","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/johntrout\/2024\/12\/07\/combining-tech-with-social-sciences-as-a-cybersecurity-analyst\/","title":{"rendered":"Combining Tech with Social Sciences as a Cybersecurity Analyst"},"content":{"rendered":"\n<p><strong><span style=\"text-decoration: underline\">Introduction<\/span><\/strong><\/p>\n\n\n\n<p>     The value of Cybersecurity Analyst increases the more often people use<br>technology as an extension of their everyday lives. Understanding the human elements<br>when working as a cyber security analyst will severely upscale their efficiency with<br>understanding vulnerabilities that humans bring in cyber space. Since so many attacks<br>are based around social engineering ideas, it helps the analyst with the decision making<br>process on how to move forward. With the understanding of how many different social<br>groups use the internet, it can be an extra tool that they can use with the decision<br>making process.<\/p>\n\n\n\n<p><br><strong><span style=\"text-decoration: underline\">How this relates to social sciences<\/span><\/strong><\/p>\n\n\n\n<p>     Social engineering attacks can range from baiting, phishing, spear fishing, etc.<br>From using a honeypot for example, cyber security analysts can use this to gather<br>information on what to look for when these attackers attempt to steal information. When<br>an analyst uses their threat detection tools such as Qradar or Wireshark, they can<br>identify suspicious emails or activity easily, preventing a breach in the security. From<br>using a white hat ethical framework, it helps what to prioritize whether its security for the<br>company or user privacy.<\/p>\n\n\n\n<p><br><strong><span style=\"text-decoration: underline\">Training and threat awareness<\/span><\/strong><\/p>\n\n\n\n<p>     While Cyber security analysts are expected to implement training to keep their<br>metrics up, its expected that they keep their employees up to date on new attacks and<br>their policies to maintain a save environment. They could use a simulated attack for<br>phishing or ransomware to see the awareness levels of the employees and see which<br>would need remedial training. While understanding the diversity is huge for a cyber<br>analyst, they need to curtail the training for specific roles, so they understand what\u2019s<br>expected of them. For threat detection, analyst\u2019s are expected to study trends online to<br>stay proactive when protecting the companies security layer. They can also remain<br>proactive on holidays just to hold extra layers of security to protect the breach.<\/p>\n\n\n\n<p><br><strong><span style=\"text-decoration: underline\">Conclusion<\/span><\/strong><\/p>\n\n\n\n<p>     In conclusion, there are several different social aspects that go into being a cyber<br>security analyst. By using Maslow\u2019s hierarchy of needs cyber security analysts can<br>really use the safety needs a good point to follow on their decision making processes.<br>By changing training to individual roles within an organization, it will benefit the<br>company at all levels and show what they need to improve on as an instructor. By using<br>several different methods to analyze data and help alleviate threats that come in the<br>network, it shows the importance of the cyber security analyst and how fast the field<br>grows.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction The value of Cybersecurity Analyst increases the more often people usetechnology as an extension of their everyday lives. Understanding the human elementswhen working as a cyber security analyst will severely upscale their efficiency withunderstanding vulnerabilities that humans bring in cyber space. Since so many attacksare based around social engineering ideas, it helps the analyst &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/johntrout\/2024\/12\/07\/combining-tech-with-social-sciences-as-a-cybersecurity-analyst\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Combining Tech with Social Sciences as a Cybersecurity Analyst<\/span><\/a><\/p>\n","protected":false},"author":29460,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":7},"categories":[7],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/johntrout\/wp-json\/wp\/v2\/posts\/296"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/johntrout\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/johntrout\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johntrout\/wp-json\/wp\/v2\/users\/29460"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johntrout\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/johntrout\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/johntrout\/wp-json\/wp\/v2\/posts\/296\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/johntrout\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johntrout\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/johntrout\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}