Career Paper

Njomi Mukete
11/24/2024

Cloud Security Analyst
Introduction
As a Cloud Security Analyst in the modern connected world, this position is more important than
ever. With more and more enterprises shifting to the cloud, it is not just the protection of
information and privacy that has increased but also the prevention of hacking. Cloud Security
Analysts are primarily interested in technical things like encryption, firewalls, and threat
analysis. Still, there are social science aspects that they work with too – especially when it comes
to humans, society, and minorities. This paper describes the application of social science studies
and concepts to the daily activities of a Cloud Security Analyst, particularly about privacy,
equity, and inclusivity.
Social Science and Cybersecurity


Human Behavior and Social Engineering
Understanding human behavior is a big part of social science theory deployed in cybersecurity.
Social science studies of the psychology of individuals, teams, and societies are nothing new;
they directly help Cloud Security Analysts protect against cyber threats. Part of what a
cybersecurity analyst does is stop social engineering attacks — phishing, spear-phishing,
pretexting — in which attackers coerce you into giving away valuable information. Behavioral psychology can help analysts create more effective training materials, create phishing games, and
spot trends in cyber attacks based on the targeting of humans.
The subfield of human factors in social science makes analysts aware of the users’ relationship to
technology, why certain individuals are more prone to fraud, and what to do about it. Cloud
Security Analysts, whose role in securing cloud environments is to use the social science of
security to develop methods to reduce human error.


Organizational Culture and Compliance
Cloud Security Analysts should also be aware of the company culture in which they work and
the social milieu in which cybersecurity policy is implemented. Organizational behavior studies
by social scientists tell analysts how the organization communicates, makes decisions, and resists
change. If the organization is structured hierarchically, for instance, security measures will be
easier to enforce by top-down leadership but will be opposed by bottom-up workers who feel
they don’t have input into the decision process.


In addition, social science is also a big driver of the cybersecurity regulatory and compliance
environment. As privacy issues are tackled by laws and regulations (e.g., GDPR in Europe, and
CCPA in California), the analysis needs to ensure that the cloud services they are leveraging are
protected by those laws and regulations. Social science-based social science in societal
expectations and legal regulations, Cloud Security Analysts are empowered to design policies
and controls that secure customer data and build trust between an organization and the
customers.

Marginalized Groups and Social Equity
Privacy and Security of Data in a Vulnerable Populations
Protection of marginalized groups is one of the social science principles at play in cloud security.
They may be low-income people, minorities, and those who live in places with less infrastructure
and are especially at risk of cybercrime. These groups might, for example, be more likely to use
unsecured public networks, receive fewer cybersecurity education opportunities, or fall for
identity theft schemes. Hence, Cloud Security Analysts must make sure the security systems they
design and build are accessible, fair, and secure enough to keep all of their users safe irrespective
of their experiences or capacity.
Social science work on inequality and vulnerability shapes the analysis of security as an outcome
for different categories. For instance, knowledge of socioeconomic disparities can be accessed to
design more accessible authentication for users who don’t have access to advanced technology or
cybersecurity education. What’s more, social science can allow analysts to see biases that can
unfairly disadvantage some groups and ensure that security interventions are inclusive.


Ethical Decision-Making in Cybersecurity
Another big gap where social science and cloud security overlap is ethics. Ethics and morality
social science help analysts to decide how to trade off security with privacy rights. In the case of,
for instance, whether to take surveillance action, observers should consider the social and
societal ramifications of their decision. They use social science principles – ethical studies,
human rights, etc – to look at whether their actions can have a disproportionate impact on those
who are underrepresented in the fields of surveillance and data collection.

Equity and Access in Cloud Security.
Cloud Security Analysts have come to have to think about accessibility more and more. It’s all
about designing security devices that are secure and accessible to the disabled. As the social
sciences on inclusive design and accessibility enable analysts to grasp how to build secure and
accessible systems, people from all walks of life can be part of them. For instance, if a security
mechanism is too hard or unreachable for a certain user group, this could be frustrating or,
worse, cause more breaches. Cloud security in this sense calls for understanding social concerns
around diversity and inclusion.

Conclusion
The Bottom Line: While the primary roles of a Cloud Security Analyst are technical, their work
is highly social science-oriented. Whether it is the understanding of human behavior and
organizational dynamics, thinking about the effects on marginalized populations, or making it
inclusive, social science research affects how cloud security practitioners live their day-to-day
lives. As cybersecurity threats evolve, it will be more critical for analysts to include social
science in their practices so that cloud security solutions work efficiently and fairly for all users.
In doing so, Cloud Security Analysts will be able to secure sensitive data, build trust with users,
and work towards a more secure and open digital future. Cloud Security Analyst

References
1. Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and
Control Your World. W.W. Norton & Company.
2. Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed
Systems. Wiley.
3. Privacy Rights Clearinghouse. (2023). Data Privacy and Marginalized Communities.

Leave a Reply

Your email address will not be published. Required fields are marked *