{"id":328,"date":"2024-04-22T22:42:45","date_gmt":"2024-04-22T22:42:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tks-123\/?p=328"},"modified":"2024-04-22T22:42:45","modified_gmt":"2024-04-22T22:42:45","slug":"career-paper","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tks-123\/2024\/04\/22\/career-paper\/","title":{"rendered":"Career Paper"},"content":{"rendered":"\n<p>Samael Pamie-George<br>Professor<br>Career Paper<br>4\/11\/2024<\/p>\n\n\n\n<p><br>                               Infosec Analyst\/Cybersecurity Analyst<br>Vigilant, analytical, and adaptive are just three words to describe the job of an Infosec<br>analyst and a cybersecurity analyst. The role of a security analyst is broad. It consists of<br>numerous responsibilities, like monitoring security best practices, procedures with the right tools,<br>protocols and making sure that all practices are properly used and followed. Those who have this<br>role analyze reports from useful tools to proactively identify anomalous or unusual network<br>behaviors. File access and credentialing will also be given to them to control including firewall<br>maintenance and network updates. One who is well trained in this area will have a solid<br>understanding concerning the use of data, how it is stored, how it is managed, and the different<br>kinds of cybersecurity threats. An example of these threats are ransom attacks, data theft, social<br>engineering, and etc. Penetration testing and vulnerability scans are in some cases performed<br>along with relevant changes to better security. When it comes to a larger company, security<br>analysts tend to work in a security operation center to specifically monitor, contain, remediate,<br>and detect threats. When it comes to a midsize organization, security analysts may play a broader<br>role in handling everything from security analysis and intrusion detection, to patch updates,<br>antivirus updates, and firewall maintenance. Since they are trained in security risk and of the best<br>practices, they might be requested to train employees on cybersecurity hygiene (techtarget).<br>Now, how may one describe how professionals in this field require and depend on social science<br>research and social principles in that career? In Infosec analyst\/cybersecurity analyst roles,<br>professionals tend to rely on social science research and principles for the enhancement of their<br>own effectiveness when it comes to understanding and addressing cybersecurity challenges. To<br>begin, there is the understanding of human behavior. When it comes to social science research it<br>provides an insight into human behavior, which is essential when it comes to cybersecurity.<br>Analysts need to comprehend how individuals\/groups behave online, including their motivations,<br>decision making processes, and their responses to security measures. It is this form of<br>understanding that assists them in designing security protocols that account for human factors,<br>such as susceptibility to phishing attacks or a compliance with security policies (hindawi). Now,<br>there is user-centered design. Social Science principles such as human-computer interaction, also<br>known as (HCI) along with usability studies are essential when it comes to designing secure<br>systems that are also user-friendly. The analyst must consider how people interact with<br>technology and how those interactions can impact security. For instance, applying usability<br>research can lead to a more effective security training program along with the development of<br>intuitive security controls (interaction-design). Next, there is risk assessment and management.<br>Now, social science methodologies, such as risk analysis and behavioral economics, contribute<br>to the form of assessing cybersecurity risk. By integrating insights from these disciplines,<br>analysts can better evaluate the likelihood and impact of security incidents, with the<br>consideration of both human behaviors and technical vulnerabilities that may amplify risk<br>(deloitte). Furthermore, we have security awareness and training. Social science research informs<br>the development of an effective security awareness. Analysts\/professionals use a psychological<br>principle to tailor education content along with strategies that resonate with a diverse user group.<br>For one to understand cognitive biases along with persuasion techniques helps in terms of<br>crafting messages that promote secure behaviors among fellow employees (techtarget). Now,<br>there are also ethical and legal implications. Now, do not get it mixed up, your fellow<br>cybersecurity professionals often encounter ethical and legal dilemmas which require a form of<br>consideration when it comes to one&#8217;s social, cultural, and legal norms. Social science research on<br>ethics, privacy, and governments informs decision-making processes related to data protection,<br>compliance with regulations, and incident response (augusta). The last topic to be discussed is<br>policy development and advocacy. When it comes to social science, it contributes its own form<br>of shaping cybersecurity policies and regulations. Analysts collaborate with policymakers to<br>understand societal implications of cybersecurity measures, such as privacy concerns, equity in<br>access to technologies, and a broader implication on digital rights (nces.ed.gov).<br>All in all, in Infosec Analyst and Cyber Security Analyst jobs, professionals benefit from<br>integrating social science research into their own work, creating holistic security strategies which<br>are all accounting for human behavior, usability considerations, risk management, ethical<br>considerations, an\\d policy implications. As I said earlier, this enhances the effectiveness and<br>relevance of cybersecurity practices in today\u2019s complex digital environment. So, how may one<br>describe how professionals in this field require and depend on social science research and social<br>principles in that career? That is how. Thank you.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br>                                                    Works Cited<br>Awati, R. (2024, January 5). Top 8 in-demand cybersecurity jobs for 2024 and beyond. WhatIs.<br>https:\/\/www.techtarget.com\/whatis\/feature\/5-top-cybersecurity-careers<\/p>\n\n\n\n<p><br>Chakraborty, P. (2024, March 28). Computer, Computer Science, and Computational Thinking:<br>Relationship between the Three Concepts. Hindawi.<br>https:\/\/www.hindawi.com\/journals\/hbet\/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaig<br>n=HDW_MRKT_GBL_SUB_ADWO_PAI_KEYW_JOUR_HBET_GENPH&amp;gad_source=1&amp;g<br>clid=Cj0KCQjwlN6wBhCcARIsAKZvD5hOuT5cNyvQAfEhIAyqEXfsuCXJOIVzfvR_KYsAUa1bKzsMBfc9yUaAhbREALw_wcB<\/p>\n\n\n\n<p><br>Deloitte. (2024). Detect and protect: 5-part series on Enterprise Risk Management: Deloitte US.<br>Deloitte. https:\/\/www2.deloitte.com\/us\/en\/pages\/deloitte-private\/articles\/risk-managementstrategies-for-privatecompanies.html?id=us%3A2ps%3A3gl%3Adpermsp2%3Aawa%3Adp%3A021324%3Arisk+ma<br>nagement+strategies%3Ab%3Ac%3Akwd-<br>24193541&amp;gad_source=1&amp;gclid=Cj0KCQjwlN6wBhCcARIsAKZvD5h36XMBwi0rH3OnVvd3<br>p8-kXGiP0Ob5MtubAKqmLkch4Iq2JytLJ3AaAtzzEALw_wcB<\/p>\n\n\n\n<p><br>Ed.gov, Ies. nces. (2024). Chapter 3-Security Policy: Development and implementation, from<br>safeguarding your technology, NCES publication 98-297 (National Center for Education<br>Statistics). https:\/\/nces.ed.gov\/pubs98\/safetech\/chapter3.asp<\/p>\n\n\n\n<p><br>University, A. (2023, August 21). Cybersecurity ethics grows in urgency as the digital landscape<br>continues to Transform Society. Cybersecurity Ethics: What Cyber Professionals Need to Know.<br>https:\/\/www.augusta.edu\/online\/blog\/cybersecurity-ethics<\/p>\n\n\n\n<p><br>User Centered Design (UCD). (2024, January 17). What is User Centered Design (UCD)?. The<br>Interaction Design Foundation. https:\/\/www.interaction-design.org\/literature\/topics\/usercentered-design<\/p>\n\n\n\n<p><br>Yasar, K., &amp; Pratt, M. K. (2023, October 12). What is Security Awareness Training?: Definition<br>from TechTarget. Tech Target. https:\/\/www.techtarget.com\/searchsecurity\/definition\/securityawareness-training<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Samael Pamie-GeorgeProfessorCareer Paper4\/11\/2024 Infosec Analyst\/Cybersecurity AnalystVigilant, analytical, and adaptive are just three words to describe the job of an Infosecanalyst and a cybersecurity analyst. The role of a security analyst is broad. It consists ofnumerous responsibilities, like monitoring security best practices, procedures with the right tools,protocols and making sure that all practices are properly used&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tks-123\/2024\/04\/22\/career-paper\/\">Read More<\/a><\/div>\n","protected":false},"author":27872,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/posts\/328"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/users\/27872"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/posts\/328\/revisions"}],"predecessor-version":[{"id":329,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/posts\/328\/revisions\/329"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/categories?post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tks-123\/wp-json\/wp\/v2\/tags?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}