Introduction
Cybersecurity analysts are responsible for the monitoring and responding to security incidents in networks, or other realms. They can analyze current security protocols, investigate potential threats, and can effectively mitigate risks. This paper will be dedicated to the cybersecurity career of analysts it will discuss the correlation between cybersecurity analysts and social science principles, key concepts from class, three challenges between marginalized groups, and lastly, analysts’ connection and dynamic to society.
Review of Literature
Firstly, the discussion of social science principles and the correlation to cybersecurity analysts. The social science principle that is to be discussed in relation to the career is ethical neutrality, this principle refers that researchers must adhere to ethical standards when conducting research. Ethical neutrality relates to the career of cybersecurity analysts because it is the analysts’ job to essentially have a foot in both worlds of the cybersecurity realm in where the analyst has to develop a mindset to combat and mitigate the risks of threats. An example by Pawlicka for this dilemma is stated as so, “is it ethical to impersonate a criminal, or even try to trick one as part of their research” (Pawlicka et al, 2023). This example highlights the restraint these analysts practice for ethical neutrality so, when walking the tight rope between the two worlds the ethical neutrality principle is paramount.
Next, key concepts that can be implemented from this semester class modules are in multitude. From modules 3, 4, 5, and 6 there are concepts that are in relation to cybersecurity analyst profession.
The first concept that is from class, is from module three, that can be properly applied to the profession as well as three challenges towards marginalized groups is the concept of diversity and cybersecurity. Firstly, this concept relates to the profession because, it is important to have a sense of diversity because there is a heavy underrepresentation that allows for a better sense of knowledgeable ideas and techniques to further acclimate to risks and threats. This concept also bridges the career of cybersecurity analyst and three challenges for marginalized groups. The three challenges between marginalized groups and the career are the hardships, inclusion, and domination of homogenous communities that women and minorities are trying to implement themselves in. Burrell and Nobles discuss this stating, “the shortage of cybersecurity professionals becomes more cumbersome when women and minorities remain significantly underrepresented” (Burrell and Noble, 2018). This quote helps explain the hardships and inclusion issue is because of the mass underrepresentation of these marginalized groups causing them to be more outcasts in their own field than they are already. The other issue of domination of homogenous communities especially in this specific career the dangers of a homogenous community is that in contrast a diverse community promotes differences in thought processes, allows for inclusion of individuals with various specialties, etc.
The next two concepts from class are from module four and five, which deals into the concept of psychological factors and theories of risks, and cyber offending. This goes hand in hand with this specific career because they may implement these concepts to best think like the perpetrators they are trying to prevent. So, analysts may try implementing thought processes that can include considering a perpetrators psychological factor such as a low self-control, aggression etc. They may also apply this thought to try understanding cyber offending by considering psychological theories such as cognitive, psychodynamic, behavioral, etc.
The last concept in relation to class is from module six, perceptions and safety. This does apply to the career because as it was put for class is that our understanding and perceptions of our own safety will influence victimization. This same idea can be understood through the lens of an analyst because as everyone views things differently and each person’s perception will impact how effectively an individual in this profession can develop remedies to mitigate risks or create strategies.
Finally, the connection and dynamic between society and analyst stem from the advantages that are available to certain facets of society. An impeding connection that will always be relating to cybersecurity analysts and society is that of resources and access to them. Maschmeyer reflects on this idea, “threats to organizations which lack the resources to pay for high-end cyber defense, tend to be neglected or entirely bracketed” (Maschmeyer et al, 2021). This career will always have this specific strain of connection of resource access to society because the affluent are considerably more able to obtain this advantage of defense and risk mitigation.
Conclusion
In conclusion this career requires social science principles and research and a diversified group to best fulfill the duties of their job. This paper discussed the principle of ethical neutrality, key concepts such as psychological factors and theories, perceptions and safety, and diversity, the relationship between an analysts’ job and marginalized groups, lastly, the connection of this career to society.
References
Burrell, D. N., & Nobles, C. (2018). Recommendations to develop and hire more highly qualified women and minorities cybersecurity professionals. In International Conference on Cyber Warfare and Security (pp. 75-81). Academic Conferences International Limited.
Maschmeyer, L., Deibert, R. J., & Lindsay, J. R. (2021). A tale of two cybers – how threat reporting by cybersecurity firms systematically underrepresents threats to civil society. Journal of Information Technology & Politics, 18(1), 1–20. https://doi.org/10.1080/19331681.2020.1776658
Pawlicka, A., Choraś, M., Kozik, R., & Pawlicki, M. (2023). First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions. Personal & Ubiquitous Computing, 27(2), 193–202. https://doi-org.proxy.lib.odu.edu/10.1007/s00779-020-01510-3
Leave a Reply