{"id":341,"date":"2024-12-07T06:48:45","date_gmt":"2024-12-07T06:48:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/njomimukete1\/?p=341"},"modified":"2024-12-07T07:38:27","modified_gmt":"2024-12-07T07:38:27","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/njomimukete1\/2024\/12\/07\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Njomi Mukete<br>11\/24\/2024<br><\/p>\n\n\n\n<p>                                                           Cloud Security Analyst<br>Introduction<br>As a Cloud Security Analyst in the modern connected world, this position is more important than<br>ever. With more and more enterprises shifting to the cloud, it is not just the protection of<br>information and privacy that has increased but also the prevention of hacking. Cloud Security<br>Analysts are primarily interested in technical things like encryption, firewalls, and threat<br>analysis. Still, there are social science aspects that they work with too \u2013 especially when it comes<br>to humans, society, and minorities. This paper describes the application of social science studies<br>and concepts to the daily activities of a Cloud Security Analyst, particularly about privacy,<br>equity, and inclusivity.<br>Social Science and Cybersecurity<\/p>\n\n\n\n<p><br>Human Behavior and Social Engineering<br>Understanding human behavior is a big part of social science theory deployed in cybersecurity.<br>Social science studies of the psychology of individuals, teams, and societies are nothing new;<br>they directly help Cloud Security Analysts protect against cyber threats. Part of what a<br>cybersecurity analyst does is stop social engineering attacks \u2014 phishing, spear-phishing,<br>pretexting \u2014 in which attackers coerce you into giving away valuable information. Behavioral psychology can help analysts create more effective training materials, create phishing games, and<br>spot trends in cyber attacks based on the targeting of humans.<br>The subfield of human factors in social science makes analysts aware of the users\u2019 relationship to<br>technology, why certain individuals are more prone to fraud, and what to do about it. Cloud<br>Security Analysts, whose role in securing cloud environments is to use the social science of<br>security to develop methods to reduce human error.<\/p>\n\n\n\n<p><br>Organizational Culture and Compliance<br>Cloud Security Analysts should also be aware of the company culture in which they work and<br>the social milieu in which cybersecurity policy is implemented. Organizational behavior studies<br>by social scientists tell analysts how the organization communicates, makes decisions, and resists<br>change. If the organization is structured hierarchically, for instance, security measures will be<br>easier to enforce by top-down leadership but will be opposed by bottom-up workers who feel<br>they don\u2019t have input into the decision process.<\/p>\n\n\n\n<p><br>In addition, social science is also a big driver of the cybersecurity regulatory and compliance<br>environment. As privacy issues are tackled by laws and regulations (e.g., GDPR in Europe, and<br>CCPA in California), the analysis needs to ensure that the cloud services they are leveraging are<br>protected by those laws and regulations. Social science-based social science in societal<br>expectations and legal regulations, Cloud Security Analysts are empowered to design policies<br>and controls that secure customer data and build trust between an organization and the<br>customers.<\/p>\n\n\n\n<p>Marginalized Groups and Social Equity<br>Privacy and Security of Data in a Vulnerable Populations<br>Protection of marginalized groups is one of the social science principles at play in cloud security.<br>They may be low-income people, minorities, and those who live in places with less infrastructure<br>and are especially at risk of cybercrime. These groups might, for example, be more likely to use<br>unsecured public networks, receive fewer cybersecurity education opportunities, or fall for<br>identity theft schemes. Hence, Cloud Security Analysts must make sure the security systems they<br>design and build are accessible, fair, and secure enough to keep all of their users safe irrespective<br>of their experiences or capacity.<br>Social science work on inequality and vulnerability shapes the analysis of security as an outcome<br>for different categories. For instance, knowledge of socioeconomic disparities can be accessed to<br>design more accessible authentication for users who don\u2019t have access to advanced technology or<br>cybersecurity education. What\u2019s more, social science can allow analysts to see biases that can<br>unfairly disadvantage some groups and ensure that security interventions are inclusive.<\/p>\n\n\n\n<p><br>Ethical Decision-Making in Cybersecurity<br>Another big gap where social science and cloud security overlap is ethics. Ethics and morality<br>social science help analysts to decide how to trade off security with privacy rights. In the case of,<br>for instance, whether to take surveillance action, observers should consider the social and<br>societal ramifications of their decision. They use social science principles \u2013 ethical studies,<br>human rights, etc \u2013 to look at whether their actions can have a disproportionate impact on those<br>who are underrepresented in the fields of surveillance and data collection.<\/p>\n\n\n\n<p>Equity and Access in Cloud Security.<br>Cloud Security Analysts have come to have to think about accessibility more and more. It\u2019s all<br>about designing security devices that are secure and accessible to the disabled. As the social<br>sciences on inclusive design and accessibility enable analysts to grasp how to build secure and<br>accessible systems, people from all walks of life can be part of them. For instance, if a security<br>mechanism is too hard or unreachable for a certain user group, this could be frustrating or,<br>worse, cause more breaches. Cloud security in this sense calls for understanding social concerns<br>around diversity and inclusion.<br><\/p>\n\n\n\n<p>Conclusion<br>The Bottom Line: While the primary roles of a Cloud Security Analyst are technical, their work<br>is highly social science-oriented. Whether it is the understanding of human behavior and<br>organizational dynamics, thinking about the effects on marginalized populations, or making it<br>inclusive, social science research affects how cloud security practitioners live their day-to-day<br>lives. As cybersecurity threats evolve, it will be more critical for analysts to include social<br>science in their practices so that cloud security solutions work efficiently and fairly for all users.<br>In doing so, Cloud Security Analysts will be able to secure sensitive data, build trust with users,<br>and work towards a more secure and open digital future. Cloud Security Analyst<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>References<br>1. Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and<br>Control Your World. W.W. Norton &amp; Company.<br>2. Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed<br>Systems. Wiley.<br>3. Privacy Rights Clearinghouse. (2023). Data Privacy and Marginalized Communities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Njomi Mukete11\/24\/2024 Cloud Security AnalystIntroductionAs a Cloud Security Analyst in the modern connected world, this position is more important thanever. With more and more enterprises shifting to the cloud, it is not just the protection ofinformation and privacy that has increased but also the prevention of hacking. Cloud SecurityAnalysts are primarily interested in technical things&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/njomimukete1\/2024\/12\/07\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":28606,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":3},"categories":[14],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts\/341"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/users\/28606"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/comments?post=341"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts\/341\/revisions"}],"predecessor-version":[{"id":342,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/posts\/341\/revisions\/342"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/media?parent=341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/categories?post=341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/njomimukete1\/wp-json\/wp\/v2\/tags?post=341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}