{"id":67,"date":"2024-12-04T19:32:53","date_gmt":"2024-12-04T19:32:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/scottworm\/?page_id=67"},"modified":"2024-12-06T05:54:19","modified_gmt":"2024-12-06T05:54:19","slug":"career-paper","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/scottworm\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p><strong>Cybersecurity Career Professional Paper on Network Security<\/strong><br><br>Select a type of cybersecurity career and write a two-page paper describing how professionals in that career require and depend on social science research and social science principles in those careers. Pay specific attention to the key concepts learned in class and demonstrate how those concepts are applied in the job you selected. The focus should be on showing how the material from class relates to cybersecurity professional&#8217;s daily routines. Specific attention should be given to how the career relates to marginalized groups and society in general. Students should use at least three reliable sources to write the paper.<\/p>\n\n\n\n<p><br>1. Business writing skills apply. So, your paper must be complete with a name, title, headings to guide the reader, and a conclusion.<br>2. The paper must have a minimum of 500+ words<br><\/p>\n\n\n\n<p>The cybersecurity career that will be talked about in this professional paper is Network security and how<br>professionals utilize social science research and principles in that career. Network security involves the use of policies, processes, and practices that are adopted to monitor, detect, and prevent unauthorized use, access, or modification of computer data and networks.<br><\/p>\n\n\n\n<p>Professionals in the career of Network security utilize the behavior and mindsets of cybercriminals to<br>understand how they attack, predict their methods of attack by using their behavior patterns, and recognize why they do it from their perspective. Cybersecurity defenders utilize key concepts involving their understanding of utilizing their professional skills, understanding hacking, utilizing Risk Assessment, and showing the importance of network security and policies.<\/p>\n\n\n\n<p><br>A good cybersecurity professional possesses a great understanding of their diverse set of skills and must<br>use everything they know to defend against criminals. To stop a cybercriminal, professionals must think like one to understand the mindset of what criminals do to attack and how to counter it. Professionals must use their critical thinking to recognize how decision-making unfolds in the event a breach occurs, analyze the situation so they get an understanding of what occurred and what to look out for in identifying behavior patterns that guide criminals into attacking, and then use their Analytical thinking to design policies that were built off behavior patterns to prevent the attack method from being used again. <\/p>\n\n\n\n<p>Understanding hacking will determine the behaviors of the cybercriminal that help utilize what areas they<br>would attack. Mostly, Hackers often attack a high-value target because they desire that area for profit and will utilize any exploit they can find to attack. So, when a professional hacker understands the motives of a cybercriminal, they can monitor the areas of high interest more closely and with extra care.<br><\/p>\n\n\n\n<p>Risk assessment involves knowing the most important internal and external cybersecurity threats there are in an organization. Network Professionals determine the risk of the technology and conduct a cost-benefit analysis that understands the rational choices individuals and businesses can make in their best interest in terms of cost and security. If before or after a breach occurs, the cybersecurity professional must understand what assets are vulnerable to attacks, what could be compromised, what levels of risk are acceptable, what the level of cost for risk mitigation afterward is acceptable, and how to minimize susceptibility to new and changing threats.<br><\/p>\n\n\n\n<p>Network security also utilizes the importance of cybersecurity regulations. Creating policies based on<br>attack patterns of cybercriminals can help protect a network from the most prominent threats that help mitigate the costs in an organization. If a cybercriminal were to breach and cause damage to the organization, a policy can be formulated utilizing social science to examine the attack pattern as well as the motivation for causing a breach. This can help advocate for tougher rules that help innovate for enhanced security as well as a set of rules and guidelines to prevent mistakes from occurring in the field of cybersecurity and employee mistakes.<\/p>\n\n\n\n<p><br>In conclusion, understanding the behavior attack patterns can help understand how criminals act to defend against attacks, understand the knowledge of hacking to defend utilize what areas would most likely be attacked, assess what could be damaged to mitigate costs from attacks and help create policies that utilize attack patterns of past criminals to help advocate for safer network environments<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Career Professional Paper on Network Security Select a type of cybersecurity career and write a two-page paper describing how professionals in that career require and depend on social science research and social science principles in those careers. Pay specific&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/scottworm\/career-paper\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29416,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/pages\/67"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/users\/29416"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/pages\/67\/revisions"}],"predecessor-version":[{"id":114,"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/pages\/67\/revisions\/114"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/scottworm\/wp-json\/wp\/v2\/media?parent=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}