{"id":334,"date":"2023-12-04T02:02:01","date_gmt":"2023-12-04T02:02:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nguma001\/?p=334"},"modified":"2023-12-08T23:05:54","modified_gmt":"2023-12-08T23:05:54","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nguma001\/2023\/12\/04\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p><a>202310_CYSE201S_24153 CYBERSECURITY &amp; SOCIAL SCIENCE<\/a><\/p>\n\n\n\n<p>Cyber Security and Social Science<\/p>\n\n\n\n<p>Nathan Guman<\/p>\n\n\n\n<p>Carrer Paper<\/p>\n\n\n\n<p><a>Introduction:<\/a><\/p>\n\n\n\n<p>According to the US Commerce Department\u2019s Bureau of Economic Analysis, the digital economy accounted for 10.3% of US GDP, or 2.4 trillion dollars in 2021, with an average growth rate of 6.7% over the last 5 years (BEA). The internet and computer networks have grown to become a fixture, even a requirement for conducting economic activity. As history has shown, where there is economic activity criminal activity will follow and computers are no exception. \u201cCybercrime is predicted to cost the world $8 trillion USD in 2023, according to Cybersecurity Ventures. If it were measured as a country, then cybercrime would be the world\u2019s third largest economy after the U.S. and China (Freeze)\u201d. Preventing cybercrime is a complex operation however the first line of defense for most organizations is the Cybersecurity Analyst position within the company and these Analysts must understand social science and its principles to be successful at their jobs.<\/p>\n\n\n\n<p>Section 1: Cybersecurity Analyst Job Description<\/p>\n\n\n\n<p>\u201cA cyber security analyst protects a company\u2019s network and data infrastructures from security breaches, suspicious activities, and malware attacks. They monitor a company\u2019s network, implement firewalls, and create contingency plans for information systems (NEIT)\u201d. Protection of the computer network and the data within is the core responsibility for a cybersecurity analyst. An important aspect an analyst must always keep in mind is the network and its data is to be protected from a person. Far to often the focus becomes the machines and forgets the person. Computer systems and data revolve around and exist by and for people. Computers are ultimately a social phenomenon. The group of scientific disciplines that study social phenomenon are called the social sciences.<\/p>\n\n\n\n<p>Section 2: Social Science Principles<\/p>\n\n\n\n<p>There are many different fields of social science covering a huge variety of topics. Criminology, Economics, political science, psychology, and sociology as just a few fields of study within social science. To cover such a diverse and different areas of study under a single umbrella term may seem too simplistic or that it may dilute the potency of the description. However, each of these areas share the same basic scientific principles. Relativism, Objectivity, Parsimony, determinism, ethical neutrality, and skepticism are all principles shared across these diverse fields of study. It is these principles that help to shape and guide the scientific process, and which must be understood by any who work with social phenomena, including the use of computer systems.<\/p>\n\n\n\n<p>Section 3: Cybersecurity Analyst and Social Science<\/p>\n\n\n\n<p>There are many different types of cybercrime and cyberthreats which an analyst must be knowledgeable on, and which all have at least one common thread. Weather is it hacking, fraud, malware, or ransomware, at the other end of the attack is the attacker, is the person. What brought them to commit cybercrime and how does this path inform how they might attack the network? It a question which cannot solely be answered in the cyber realm but the realm of psychology or criminology. How must data on the attack be preserved and documented in a way where it can be used in a court of law? The technical aspects of data forensics and data structure must be understood by the analyst, however criminal justice and law must also be considered and understood. There are very few, if any, scenarios where the job of a Cybersecurity analyst does not touch other aspect of social science.<\/p>\n\n\n\n<p>Some of the daily tasks of a cybersecurity analyst are intrusion detection, endpoint management, data security, networking and network security and programming (Coursera). While undoubtably technical in nature one does not have to look far to see how these areas connect to the social science because they all involve a person.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Another aspect of the Cybersecurity Analysts job is to help create a culture within an organization of security. Building and maintaining a strong culture of cyber defense is often more impactful than any strategy or training event. This requires an understanding of people, their motivations, and habits, all areas of social scientific study.<\/p>\n\n\n\n<p>Conclusion: Impact on society<\/p>\n\n\n\n<p>More important than the massive and growing economic impact of computer networks and data, the explosive growth of social media and online interactions has shaped the world unlike anything in the past century. For the first time in human history, distance does not necessarily mean isolation anymore. The ability to communicate instantaneously across the planet has allowed for unprecedented human connection. C.S. Lewis said \u201cFriendship is born at that moment when one person says to another: &#8216;What! You too? I thought I was the only one. (1960)\u201d. The internet has allowed for more people across the world to say \u201cwhat! You too?\u201d Marginalized, isolated communities and people have found friendship, hope, a place to exist together, to find love, to organize, to fight for change, to strive for understanding, and to find more lasting peace. Often, we think of cybersecurity analysts in the world of white collar business and big money. As is often the case when humans are involved, it is so much more then we think.<br><\/p>\n\n\n\n<p>References:<\/p>\n\n\n\n<p>BEA, \u201cDigital Economy | U.S. Bureau of Economic Analysis (BEA).\u201d Bea.gov , <a href=\"http:\/\/www.bea.gov\/data\/special-topics\/digital-economy\">www.bea.gov\/data\/special-topics\/digital-economy<\/a>. Accessed December 2023<\/p>\n\n\n\n<p>Freeze, Di. \u201cCybercrime to Cost the World 8 Trillion Annually in 2023.\u201d Cybercrime Magazine, 13 Oct. 2022, cybersecurityventures.com\/cybercrime-to-cost-the-world-8-trillion-annually-in-2023\/#:~:text=Our%20report%20provides%20a%20breakdown.<\/p>\n\n\n\n<p>NEIT, \u201cCyber Security Analyst Responsibilities.\u201d NEIT, 18 Jan. 2022, <a href=\"http:\/\/www.neit.edu\/blog\/what-does-a-cyber-security-analyst-do\">www.neit.edu\/blog\/what-does-a-cyber-security-analyst-do<\/a>.<\/p>\n\n\n\n<p>Coursera. \u201cWhat Does a Cybersecurity Analyst Do? 2023 Job Guide.\u201d Coursera, 21 July 2023, www.coursera.org\/articles\/cybersecurity-analyst-job-guide.<\/p>\n\n\n\n<p>Lewis, C.S. The Four Loves. 1960. San Francisco, Harperone, 1960.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>202310_CYSE201S_24153 CYBERSECURITY &amp; SOCIAL SCIENCE Cyber Security and Social Science Nathan Guman Carrer Paper Introduction: According to the US Commerce Department\u2019s Bureau of Economic Analysis, the digital economy accounted for 10.3% of US GDP, or 2.4 trillion dollars in 2021, with an average growth rate of 6.7% over the last 5 years (BEA). The internet&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nguma001\/2023\/12\/04\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":27517,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[3],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts\/334"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/users\/27517"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/comments?post=334"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts\/334\/revisions"}],"predecessor-version":[{"id":335,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/posts\/334\/revisions\/335"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/media?parent=334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/categories?post=334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nguma001\/wp-json\/wp\/v2\/tags?post=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}