{"id":304,"date":"2022-12-14T02:04:53","date_gmt":"2022-12-14T02:04:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/robertsheppard99\/?page_id=304"},"modified":"2022-12-14T04:36:06","modified_gmt":"2022-12-14T04:36:06","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/robertsheppard99\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Cybersecurity is becoming one of the fastest growing fields in the world. The interest is in the industry because you can work remotely for a lot of the options available. The companies are willing to pay higher wages and give more benefits because they are in dire need of workers. The threat of cyber attacks is always growing, and if a company doesn\u2019t have the resources to protect themselves, sooner or later someone will expose their weakness. The cybersecurity field is in the need for a lot of workers. Fortune.com reports that companies are \u201cdesperate\u201d for workers, and that the cybersecurity field has over \u201c700,000\u201d open jobs (Lake 2022). The number of students studying cybersecurity is increasing, but so are the job openings with the ever-changing circumstances and technology. Cybersecurity is one of the most popular choices for adults that are going back to school. People from all sorts of backgrounds are heading into the cybersecurity field in hopes of making more money. This brings me to my main point about how people from other backgrounds joining the cybersecurity field are extremely important.<\/p>\n\n\n\n<p>Social science is becoming more and more relevant to the cybersecurity industry as more studies are conducted. For far too long people have been trying to predict what attacks are coming from a technology standpoint, when they need to also look at the social standpoint. Understanding and analyzing people\u2019s behaviors and motives that typically result in cybercrimes is becoming a better way to predict when and how they will occur. You know it must be a serious way to predict crimes when the government opens a new department to strictly study the human behavior in cybersecurity to predict attacks. The world is slowly starting to realize how important the cyberspace is going to be in future conflicts, and everyone needs to be educated on how to best prepare themselves.<\/p>\n\n\n\n<p>An example of a job field in the cybersecurity field would be a Security Architect. The specific job title I am looking into would be an Information Security Architect. The other jobs in the Security Architect field all do similar jobs, but their job just focuses on different aspects of the security. The Security Architect field is the part I would like to focus on. Primarily because they have the ability to manage people and to know how to organize them. Someone in this position needs to understand some idea of social science in order to organize his team correctly. They need to also understand \u201chow to implement security planning into broader business objectives and be able to build a longer lasting security and risk-based culture to protect the organization\u201d (Sans). The reason that statement is so important to this course is because it clearly mentions that you need to have a \u201cRisk-based\u201d culture, and the best way to do that is by using social science. Predicting risks is a challenge that understanding the way people behave can help with. As Maalem states the motives, \u201ccuriosity or notoriety\u201d usually pertain to novice hackers, \u201crevenge or financial benefits\u201d usually pertain to \u201cCyber-punks that have a medium skill level\u201d, and \u201cpurely financial\u201d pertain to the people with \u201cvery high capabilities\u201d (Maalem 2020). They have been using social science to figure out which people are more likely to commit which crimes, and why.<\/p>\n\n\n\n<p>The reason this is so important is because it can change the field from one that hopes they are prepared from attacks to one that finds the culprits before they even attack and can act quickly to end the threats. Social science is the defining factor that connects humans to machines. The motives and behaviors of these hackers is what separates them from just being another bot trying to break into a server. It needs to be thoroughly investigated to make the internet and networks more secure for the people unable or unwilling to protect themselves. Too many people are being taken advantage of by younger people that know how to trick people. That is why education systems are implementing coding classes into middle schools and high schools. They need to understand the threats of the cyberspace before they get taken advantage of. Social science is a great way to understand how people think, regardless of using it in technology or not, and more people need to understand the human side of technology.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Sources<\/strong><\/p>\n\n\n\n<p>Carley, K. M. (2020). Social cybersecurity: an emerging science.&nbsp;<em>Computational and Mathematical Organization Theory<\/em>,&nbsp;<em>26<\/em>(4), 365\u2013381. <a href=\"https:\/\/doi.org\/10.1007\/s10588-020-09322-9\">https:\/\/doi.org\/10.1007\/s10588-020-09322-9<\/a><\/p>\n\n\n\n<p>\u200cMaalem Lahcen, R. A., Caulkins, B., Mohapatra, R., &amp; Kumar, M. (2020). Review and insight on the behavioral aspects of cybersecurity.\u00a0<em>Cybersecurity<\/em>,\u00a0<em>3<\/em>(1). <a href=\"https:\/\/doi.org\/10.1186\/s42400-020-00050-w\">https:\/\/doi.org\/10.1186\/s42400-020-00050-w<\/a><\/p>\n\n\n\n<p>Ahmed, O. S., &amp; Al, E. (2021). Teacher\u2019s awareness to develop student cyber security: A Case Study.&nbsp;<em>Turkish Journal of Computer and Mathematics Education (TURCOMAT)<\/em>,&nbsp;<em>12<\/em>(10), 5148\u20135156. <a href=\"https:\/\/doi.org\/10.17762\/turcomat.v12i10.5297\">https:\/\/doi.org\/10.17762\/turcomat.v12i10.5297<\/a><\/p>\n\n\n\n<p>\u200c<em> Security Architect | CISA<\/em>. (n.d.). Www.cisa.gov. <a href=\"https:\/\/www.cisa.gov\/security-architect\">https:\/\/www.cisa.gov\/security-architect<\/a><\/p>\n\n\n\n<p>\u200c<em>Companies are desperate for cybersecurity workers\u2014More than 700K positions need to be filled<\/em>. (2022). Fortune. Retrieved December 14, 2022, from <a href=\"https:\/\/fortune.com\/education\/articles\/companies-are-desperate-for-cybersecurity-workers-more-than-700k-positions-need-to-be-filled\/\">https:\/\/fortune.com\/education\/articles\/companies-are-desperate-for-cybersecurity-workers-more-than-700k-positions-need-to-be-filled\/<\/a> <\/p>\n\n\n\n<p><em>20 Coolest Cyber Security Careers | SANS Institute<\/em>. (n.d.). Www.sans.org. <a href=\"https:\/\/www.sans.org\/cybersecurity-careers\/20-coolest-cyber-security-careers\/\">https:\/\/www.sans.org\/cybersecurity-careers\/20-coolest-cyber-security-careers\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is becoming one of the fastest growing fields in the world. The interest is in the industry because you can work remotely for a lot of the options available. The companies are willing to pay higher wages and give more benefits because they are in dire need of workers. The threat of cyber attacks&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/robertsheppard99\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":24983,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/robertsheppard99\/wp-json\/wp\/v2\/pages\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/robertsheppard99\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/robertsheppard99\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robertsheppard99\/wp-json\/wp\/v2\/users\/24983"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/robertsheppard99\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/robertsheppard99\/wp-json\/wp\/v2\/pages\/304\/revisions"}],"predecessor-version":[{"id":316,"href":"https:\/\/sites.wp.odu.edu\/robertsheppard99\/wp-json\/wp\/v2\/pages\/304\/revisions\/316"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/robertsheppard99\/wp-json\/wp\/v2\/media?parent=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}