{"id":375,"date":"2023-12-07T03:16:37","date_gmt":"2023-12-07T03:16:37","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/?p=375"},"modified":"2023-12-07T03:16:37","modified_gmt":"2023-12-07T03:16:37","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/2023\/12\/07\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Information security analysts<br>Introduction<br>A dynamic and multifaceted job, information security analysis heavily depends on the<br>fusion of social science concepts and research techniques. Information security analysts&#8217;<br>success is greatly impacted by their comprehension of organizational dynamics, human<br>behavior, and larger societal contexts in addition to their technical proficiency. This is shown<br>through human behavior with computers, social networks, and risk management in the field.<br>Information security as a job consists of working to protect an organization against hacks, data<br>breaches, and overall cyber threats. (Coursera) These individuals the Information security<br>analysts are the first line of defense against cyber attacks and criminals.<br>Human behavior with computers<br>Information security analysts use social science research to see how humans generally react to technology. By studying human decision-making it can lead to enlightenment on<br>behavior patterns and mitigate security risks involved with human behavior. By using this<br>research it can also provide an easier user-friendly design for both the user\u2019s convenience and<br>their safety. This is seen in banking apps as they are easy to set up yet very secure by using<br>things such as two-factor authentication and biometric authentication. By using information<br>analysis you can learn the average behaviors and can learn and predict who would be a<br>security threat.<br>Social networks<br>With workplaces using very team-based projects and goals companies this results in<br>relationships built within the company and patterns between individuals. These can be helpful in<br>how you can use them to find out who the key team members are and who is not doing their<br>required work. By using these systems you can decide who has malicious behavior and has<br>increased threat perception against certain individuals and groups. Also by using social<br>networks, you can enforce secure levels of communication for increased<br>cybersecurity within a network and company.<br>Risk management<br>Information security analysts can use social sciences to analyze from there previous<br>endeavors and use them in the future to mitigate risks. By analyzing risks, reduces future<br>problems in the field and can build a strong base for future challenges. By minimizing losses<br>and creating easier paths for success, it makes the process faster and more efficient. Analyslist<br>also makes sure to keep ahead and compliant with their region or country\u2019s laws. Also, these<br>analysts can run fake scenarios to test their system to find vulnerabilities. Creating risk<br>management strategies can inform you on how different cultures respond to threats.<br>Conclusion<br>The Job of Information security analysts is overall to protect and enforce cybersecurity<br>within a company by adding security measures for the company networks and systems. (Bureau<br>of Labor Statistics) A profession in information security analysis relies on social science<br>research and principles. Human behavior on computers, social media, and in the workplace with <\/p>\n\n\n\n<p>risk management all demonstrate this. Working to defend an organization from hacks, data<br>breaches, and general cyber dangers is the duty of an information security specialist. (Educator)<br>The first line of defense against hackers and cyberattacks is these people, information security<br>experts.<\/p>\n\n\n\n<p>Sources<br><a href=\"https:\/\/www.coursera.org\/articles\/cybersecurity-jobs\">Cybersecurity-jobs<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\">Information-security-analysts.htm<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.coursera.org\/articles\/information-security-analysts-what-they-do\">information-security-analysts-what-they-do<\/a><\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\"><\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br>Information security analysts<br>risk management all demonstrate this. Working to defend an organization from hacks, data<br>breaches, and general cyber dangers is the duty of an information security specialist. (Educator)<br>The first line of defense against hackers and cyberattacks is these people, information security<br>experts.<br>Sources<br>Cybersecurity-jobs<br>Information-security-analysts.htm<br>information-security-analysts-what-they-do<a rel=\"noreferrer noopener\" href=\"https:\/\/www.coursera.org\/articles\/cybersecurity-jobs\" target=\"_blank\"><\/a><a rel=\"noreferrer noopener\" href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information security analystsIntroductionA dynamic and multifaceted job, information security analysis heavily depends on thefusion of social science concepts and research techniques. Information security analysts&#8217;success is greatly impacted by their comprehension of organizational dynamics, humanbehavior, and larger societal contexts in addition to their technical proficiency. This is shownthrough human behavior with computers, social networks, and risk&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/joshuabenedict\/2023\/12\/07\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":26286,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts\/375"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/users\/26286"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/comments?post=375"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts\/375\/revisions"}],"predecessor-version":[{"id":376,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/posts\/375\/revisions\/376"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/media?parent=375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/categories?post=375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuabenedict\/wp-json\/wp\/v2\/tags?post=375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}