{"id":106,"date":"2025-01-29T14:11:52","date_gmt":"2025-01-29T14:11:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mlisgendraft\/?page_id=106"},"modified":"2025-04-28T18:52:26","modified_gmt":"2025-04-28T18:52:26","slug":"resources","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kdent006\/resources\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p class=\"has-text-align-center\">The career of a Security Analyst and how Social Science is incorporated<br>in the career<br>Kaedon Denton<br>04-13-25<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Introduction<br>Being able to protect enterprises from online threats and cyberattacks is just one of the<br>many important duties that falls under the responsibility of a Security Analyst. The position of a<br>Security Analyst takes and combines their deep expertise of cybersecurity tactics and knowledge<br>and blends it with their understanding of human behavior. Through social science which deals<br>with the study of human behavior, interaction, and social trends, Security Analyst must be able to<br>formulate a understanding of their fellow employees to be able to predict risks that might arise,<br>be able to inform the users, and create inclusive and ethical tactics. With their goal being that of<br>being able to understand user behavior, formulate awareness campaigns, and help solve social<br>problems that do not guarantee proper cybersecurity benefits to all communities fairly.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Security Analyst Responsibilities<br>The responsibilities of a Security analyst include them, looking in to breaches in their<br>system(s), find weaknesses in their system(s), eradicate current\/possible threats, and play a key<br>role in formulating the company\u2019s incident response plan. While this is plenty in terms of<br>responsibilities, they also have to include one of the biggest factors\/responsibilities that requires<br>if most if not all their attention and that is, human error. Human error includes things such as a<br>user having a weak password and username, social engineering, and phishing emails. For<br>Security Analyst to be able to address human error, they must have an understanding of<br>behavioral patterns and be able to develop systems that consider the case of human error in it.<br>The problem of human error is then further exacerbated with technology increasingly affecting<br>vulnerable people more and more as time goes on, Security analyst have to consider social and<br>ethical problems when they go about implementing security solutions to current and future<br>problems.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">A Understanding of User Behavior<br>When it comes to the \u201cwhy\u201d of people that choose to reuse usernames and passwords, it<br>comes down to behavioral psychology since the user is most likely overconfident in their<br>credentials and experience a case of \u201coptimism bias\u201d, which is them expecting their chance of<br>something negative happening is lower than that of those around them. This optimism bias can<br>lead to a user that has had notifications, that either their username or reused password was in a<br>data breach incident and their information is now compromised, \u201cblowing\u201d it off believing they<br>were not affected by it since nothing that they could see has changed. Based off of cases like that<br>of optimism bias, Security have to analyst develop their plans around risk reducing, and user<br>centric problem solving.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Cyber Awareness Training (CAT) and Incident Response plan (IRP)<br>Communication as a social science not only plays a major factor in the position of a<br>Security Analyst but just in general for the position. This is a concept that is shown off in an IT\u2019s<br>department for cyber training their users. A Security Analyst has to be able to breakdown the<br>complexity of cyber security topics, tactics, and problems that are implemented, and be able to<br>engage the users (employees) in a training that is able to show and display realistic scenarios.<br>The training is created is more than often mandatory since, not only is the training going the<br>distance in further protecting the companies\u2019 systems, it is also educating users on what might be<br>a phishing email, fake link, etc., which in turn is creates and strengthens the \u201chuman firewall\u201d,<br>that is in place with proper Cyber Awareness Training, but also helps decrease chance of victim<br>precipitation taking place. While CAT is effective it does not eliminate the possibility of a cyber<br>incident occurring 100%. When an incident occurs, it falls on the IT department especially the<br>Security analyst to have had a IRP made to follow in the event of a cyber incident\/breach<br>occurring. An IRP is a document that should be made since is an outline for how the organization<br>will detect, respond to, and recover from cyber based incidents.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Marginalized Communities and Accessible Security Inclusion<br>Marginalized communities more often than not do not have access to the proper resources<br>and information that can help to serve in defending themselves from cyber-attacks. By being able<br>to help with supporting accessible instructional programs and fairly priced security services,<br>security analyst can help to provide these services to the communities. The systems and services<br>that are provided to the communities must be able to be accessible as technology advances,<br>especially now Analyst need to consider how security measures such as those now using AI can<br>impact these marginalized communities. For what systems are implemented they must not be<br>used or seen in a light of violating these people and their community privacy. With this even<br>more that other parts, this is where social science concepts are applied by security analyst to find<br>a solution that is both socially correct but ethically as well.<br><\/p>\n\n\n\n<p class=\"has-text-align-center\">Conclusion<br>While the position of a Security Analyst requires a vast amount of technical knowledge,<br>it also requires being able to understand human behavior and social influences. As seen in the<br>concepts applied social science not only provide a backbone for security analyst to follow, it also<br>plays a role in the continuous development improving their awareness trainings\/campaigns,<br>security procedures, and minimizing human error. Taking this into account it shows that a<br>interdisciplinary approach is what allows analyst to do their job with both technology and people<br>and be able to tackle current and future cybersecurity threats as time goes on as well as with<br>technology and problems old and new constantly changing.<br><\/p>\n\n\n\n<p>References<br>Lin, T., Capecci, D. E., Ellis, D. M., Rocha, H. A., Dommaraju, S.,<br>Oliveira, D. S., &amp; Ebner, N. C. (2019, September). Susceptibility to<br>spear-phishing emails: Effects of internet user demographics and<br>email content. ACM transactions on computer-human interaction : a<br>publication of the Association for Computing Machinery.<br>https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC7274040\/<br>Expanding cybersecurity in underserved communities. Nascio. (2024b,<br>November). https:\/\/www.nascio.org\/wpcontent\/uploads\/2024\/11\/NASCIO_Cybersecurity-in-UnderservedCommunities_2024_a11y.pdf<br>Anthony, A. (2023, March 13). Cyber resilience must focus on<br>marginalized individuals, not just institutions. Carnegie Endowment<br>for International Peace.<br>https:\/\/carnegieendowment.org\/research\/2023\/03\/cyber-resiliencemust-focus-on-marginalized-individuals-not-justinstitutions?lang=en<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The career of a Security Analyst and how Social Science is incorporatedin the careerKaedon Denton04-13-25 IntroductionBeing able to protect enterprises from online threats and cyberattacks is just one of themany important duties that falls under the responsibility of a Security Analyst. The position of aSecurity Analyst takes and combines their deep expertise of cybersecurity tactics&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kdent006\/resources\/\">Read More<\/a><\/div>\n","protected":false},"author":30384,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/pages\/106"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/users\/30384"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/comments?post=106"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/pages\/106\/revisions"}],"predecessor-version":[{"id":245,"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/pages\/106\/revisions\/245"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kdent006\/wp-json\/wp\/v2\/media?parent=106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}