{"id":50,"date":"2023-11-29T00:56:49","date_gmt":"2023-11-29T00:56:49","guid":{"rendered":"https:\/\/student.wp.odu.edu\/hkhan004\/?p=50"},"modified":"2023-11-29T00:56:49","modified_gmt":"2023-11-29T00:56:49","slug":"cybersecurity-career-professional-paper","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/hkhan004\/2023\/11\/29\/cybersecurity-career-professional-paper\/","title":{"rendered":"Cybersecurity Career Professional Paper"},"content":{"rendered":"\n<p>When it comes to the field of cybersecurity, there are many different forms<br>of employment that one can go for. For example, one can shoot for Network<br>security, Security engineering, Threat hunting, and many more. While all of these<br>careers require and depend on social science research as well as social science<br>principles, the one that I feel demonstrates all of these principles would be a SOC<br>analyst or a security operation center analyst. SOC analysts implement many<br>different forms of social sciences on a day-to-day basis such as sociology,<br>criminology, and psychology. How would something like psychology come into<br>play for someone who focuses on the security of a computer-based network? Well,<br>that\u2019s easy, see psychology is the study of the mind and behavior. When a SOC<br>analyst or anyone who deals with a company\u2019s cybersecurity operations has to<br>respond to a form of a cyber attack they have to be alert and aware of everything<br>and in times like those the analyst has to be able to read and understand the<br>attackers motive and what the attackers next move may be. Cybersecurity involves<br>much more mind games than what the naked eye can see. In this essay, I will break<\/p>\n\n\n\n<p>down the other forms of social science as well as psychology to describe the role<br>they play in the day-to-day life of a SOC analyst.<br>Psychology is something that can be implemented in many different<br>scenarios which includes cybersecurity. Cybersecurity implements the principles of<br>psychology to understand and respond to unsafe cyber behaviors.<br>Cyberpsychology is the term used to best explain this use of psychology. This<br>examines how we interact with others using technology, how our behavior is<br>influenced by technology, and how our psychological states can be affected by<br>technology (Kirwan, 2016). The article \u201cWhy Psychology Matters to<br>Cybersecurity\u201d by James Coker tells us that the involvement of psychology is the<br>core for being able to successfully protect and defend a network. The SOC team<br>should always hold a strong understanding of human behaviors in order to<br>successfully retaliate against any form of cyber-attack. Due to this need for<br>understanding of psychology in the cyber field, employers have even went as far to<br>implement psychology techniques in pre employment training sessions just make<br>sure new onboarding analysts understand the importance of the understanding of<br>psychology in the SOC analyst role.<br>Another social science that is just important in the cyber world as<br>psychology would be criminology. Criminology is known as the study of crime,<br>criminals, and society&#8217;s response to them. Knowing this we know that when SOC<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>analysts are faced with the task of retaliating to any form of a cyber attack, that the<br>person behind it must not be a good guy. This is where criminology can come into<br>play. Requiring the SOC analyst to play his\/her cards right and understand how to<br>respond to this type of cyber-criminal. The article \u201cCriminological Explanations<br>of Cybercrime\u201d tells us that cybercriminology plays a great role in providing an<br>understanding of the behavior of a cybercriminal and creating effective plans to<br>protect and respond to these attackers and maintain the security of the overall<br>network operations. Analysts with a solid understanding of criminology can<br>implement this strength in order to understand and analyze the patterns and<br>behaviors of the cybercriminal in order to provide for a stronger defensive<br>response. Not only does it help in the moment of an attack, but it helps when<br>creating effective protocols to abide by in the event of a future attack if one was to<br>ever occur.<br>The final social science that comes to mind when thinking of a combination<br>with cybersecurity would be sociology. Sociology is known as the study of social<br>life, social behavior, and social institutions. These studies go hand in hand with<br>cybersecurity because not only does cybersecurity focus on the study of preventing<br>vulnerability breaches and resolving security issues but it also focuses on the social<br>behaviors of the users and their behaviors on that same network. SOC analysts are<br>usually like the army for a business providing protection the same way our US<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>military is out there to protect our country. And in order to protect a high volume<br>of users the analysts have to have a strong understanding of the software\u2019s and<br>movements these users make on the network on a day-to-day basis. The article<br>\u201cSocial Cyber-Security\u201d makes a few great points on exactly how sociology is<br>implemented in cyber security. One great example given by the article was<br>messaging and communication. Analysts have to be able to keep track and monitor<br>day-to-day communication in order to ensure that there is no communication or<br>sensitive information being shared with unauthorized senders that can lead to<br>possible breaches in the network. This requires a great sense of sociology by<br>making sure that all communication is valid and safe. Hence why sociology can<br>play such a vital role in keeping organizations safe and keeping SOC analysts on<br>top of their game.<br>Inconclusion, the role of a SOC analyst depends highly on many forms of<br>social sciences including the ones that have been listed along with others that may<br>have not been listed. Cybersecurity is much more than clicking and typing and<br>knowledge of hardware and software\u2019s. It can in many instances become a game of<br>mental reading as well. To be able to excel in the field of cybersecurity or in the<br>position of a SOC analyst one must make sure that they are brought up to speed<br>and have a grasp for all different forms of social sciences and how they can<br>implement these social sciences in order to keep the company they work for and<\/p>\n\n\n\n<p>the users around them safe and protected. While there are many people who may<br>believe having just a knowledge of firewalls and antivirus systems will keep them<br>protected, the ones who go above and beyond to implement social sciences in their<br>work are the ones will be able to achieve great success.<\/p>\n<a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Facebook\" href=\"https:\/\/www.facebook.com\/facebook\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Follow us on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Twitter\" href=\"https:\/\/twitter.com\/twitter\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Follow us on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Find us on Linkedin\" href=\"https:\/\/www.linkedin.com\/in\/yourid\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Find us on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-instagram nolightbox\" data-provider=\"instagram\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our instagram feed\" href=\"https:\/\/instagram.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"instagram\" title=\"Check out our instagram feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/instagram.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-flickr nolightbox\" data-provider=\"flickr\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our flickr feed\" href=\"https:\/\/www.flickr.com\/photos\/myusername\/\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"flickr\" title=\"Check out our flickr feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/flickr.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-foursquare nolightbox\" data-provider=\"foursquare\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our foursquare feed\" href=\"https:\/\/foursquare.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"foursquare\" title=\"Check out our foursquare feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/foursquare.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Contact Us\" href=\"mailto:mail@example.com?subject=Contact%20Request\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Contact Us\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/student.wp.odu.edu\/hkhan004\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>When it comes to the field of cybersecurity, there are many different formsof employment that one can go for. For example, one can shoot for Networksecurity, Security engineering, Threat hunting, and many more. While all of thesecareers require and depend on social science research as well as social scienceprinciples, the one that I feel demonstrates [&hellip;]<\/p>\n","protected":false},"author":27219,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/50"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/users\/27219"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/comments?post=50"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/50\/revisions"}],"predecessor-version":[{"id":51,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/posts\/50\/revisions\/51"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/media?parent=50"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/categories?post=50"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/hkhan004\/wp-json\/wp\/v2\/tags?post=50"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}