Discourse Community
Student’s Name
Institution
Cover memo
My project title Cyber Analysis as a Discourse Community comprehensively covered all the relevant elements involved in cybersecurity as well as the language utilized by this specific community. The planning phase of the analysis was essential in ensuring all factors are considered. “Without proper planning, nothing constructive can be achieved (Roesener, Bottolfson & Fernandez, 2014).” This statement highlights the essence of planning activities for a well-grounded analysis. The planning involved a careful selection of participants who were to take part in generating relevant information in regards to the discourse community to be studied. Similarly, the planning phase also considered the relevant methodology to be utilized in ensuring the effectiveness of the study towards the generation of viable and reliable data. The elements of the methodology sector included how the individual respondents in this study were to be reached as well as the language they heavily utilized. In regards to this, the study utilized the interview as its data collection technique with professional cyber analysts forming the targeted respondents. The planning process also allowed me to structure the manner in which my essay was to be organized.
Similarly, proper planning was also essential in helping me to select explicit literal styles to use in my essay. Through this, I constructed a strong essay with the use of literal styles like ethos and logos. Logos enabled me to present a logical illustration of all the elements involved in this discourse community. Logical presentation of facts and figures is imperative in ensuring a robust presentation the main idea. Additionally, my essay has taken into consideration the ethical aspects involved in this discourse community, which is quite effective in convincing the target audience to take into consideration the information presented. However, it is always imperative to utilize Pathos in further enhancing particular writing. This formed the biggest weakness of my writing since my usage of pathos in the essay was quite limited. Pathos allows an individual writer to consider the emotional perspective of the target audience and constructed well-structured statements with an emotional appeal to the audience.
I further ensured the essay observed all the fundamental grammar requirements that are necessary for ensuring a fluidly and free-flowing essay. Through this, I ensured my word choices were all related to the discourse family at hand. Similarly, the structures of my sentences were also up to the required grammatical standards with strong cohesion between all paragraphs. Clear observation of the required grammatically standards has been identified as imperative in ensuring precise communication and effective delivery of the intended message. Similarly, my organization of the work was also in accordance with the required standards with the introduction as the first part of the work followed by background information and then methodology. The methodology section was followed by the result and discussion section and then the goals of the study and genre analysis sections respectively.
Cyber Analysis as a Discourse Community
Introduction
The rise of the Internet along with the proliferation of technological devices has brought forth the issue of cybersecurity. Indeed, cybersecurity has morphed into a discipline and profession of its own and is currently a wide field. Cybersecurity analysts play a vital role in this field and their role is becoming increasingly important in many organizations and industrial sectors. Cybersecurity experts plan and deploy security strategies to safeguard an organization’s systems and networks.
Background
Well-structured study of a discourse community is essential in gaining critical insights on how to analyses a specific discourse community. As observes by John Swales, one of the renowned linguists around the globe, a discourse community is a community united by well-determined goals and objectives with several means of communication put in place to help individual members effectively interact to realize these goals. Cybersecurity plan, deploy and examine security protocols to safeguard digital information and computer networks. The advent of the Internet has since given birth to what is referred to as the ‘Internet Economy’. Driving this Internet economy are increased business innovations and increased connectivity, and for these reasons, many people visit the Internet daily. Similarly, the use of the Internet has continued to grow, so has the number of security risks that users face in cyberspace, and this has several adverse effects on not just individuals, but also governments and businesses, that is, the potential of cyberspace to make valuable contributions in people’s lives (Dawson & Thomas, 2018).
Besides, other than the direct impact of cyberspace security breaches, they also affect the confidence of people on the use of the Internet, and because of these, ultimately, the economic opportunity contained in the cyberspace suffers. Cybersecurity analysts play an important role in mitigating these type of threats. Some of the common computer crimes include swindling of assets, electronic money theft, and insurance scams. Cybercrimes are being fueled by the fact that connection to the Internet has grown over the years. Part of what has driven this is social media, with many people using this platform to communicate. Another factor is the advent of newer technologies, particularly mobile devices that are connected online (Roesener, Bottolfson, & Fernandez, 2014). But, it is not just about individuals. Businesses are also increasingly basing many of their transactions online. Due to this, many organizations are employing full-time cybersecurity analyst whose job is to come up with strategies to prevent cybersecurity threats.
Method
The analysis is based on the results of an interview with a cybersecurity expert. The interview delivered valuable insights about the nature of the job and what is required to become an expert in the field of cybersecurity. Aside from the interview, a genre-analysis of the type of job openings in the field of cyber analytics in Huntersville, Alabama will be performed to demonstrate the demand of these skills by companies operating in different industries. The insight will be backed up with an examination of the need for cybersecurity analysts in three different locations. The results will be examined from the lens of the article “The future Cybersecurity Workforce: Going beyond Technical Skills for Successful Cyber performance” to enable a detailed analysis of the discipline.
Results and Discussion
The findings from the interview will be presented using Swales’ characteristics of a discourse community. These include the common goals, the threshold level of members, method of communication, participatory mechanisms, and genres produced. The application of this format gives a clear picture of the scope of the job of cybersecurity analysts, the tasks, they perform, and the requirements of becoming part of this discourse community.
Goals
Cybersecurity analysts are vital in the national fight against cyber-attacks, which forms their primary goal. As identified by Swales (220), it is the commonality of goals and not shared objective that is always critical. Through this, cyber analysts are united in realizing zero cyber-attacks in the form of phishing and ransomware among other forms of cyberattacks. The fight against cybercrime takes a multi-stakeholder approach, that is, the collaboration between the government and the public sector. The idea is to pool the skills and resources into a single force. A multi-stakeholder consultation is a significant approach in dealing with issues of civil liberties and the implementation of policies (Sobolweski & Bae, 2016). The partnership between security agencies is crucial as jurisdictions consist of regional borders that cyberspace does not. Otherwise, it is hard to assign the responsibility of cybercrime, both, in relation to, the difficulty of tracing attacks and the lack of guidelines that demonstrates a clear assignment of liability. Cooperation between the public and private sector can significantly boost the efforts to create awareness on the issue of cybersecurity and to ensure that critical infrastructure is resilient, and services are available (Aina, & Jung, 2016). In the end, it can be possible to deploy an effective policy for IT framework, in regards to, tools and assets required for the network to operate and stay resilient, and also, in regards to, coordination techniques where security threats happen in large scale.
But, the success of such a strategy depends on the aptitude of state bodies to consult effectively with businesses in the setting of not only national security but also economic security. Their objective of ensuring suitable collaboration is gaining mutual and critical public policy objectives while at the same time relieving businesses of undue burdens. However, such cooperation has been hard to establish (Aina, & Jung, 2016). One of the major dilemmas that face efforts toward cybersecurity is how to establish an effective framework for facilitating the sharing of information between private entities and the government. The desire is to find a simple framework, but that is difficult, considering the complex network of relations among businesses and also between the private and public sectors. When it comes to information sharing, there has been a historical problem with coordination of public-private partnerships (Marguleas, 2016). There exists no choice about it. Governments and businesses should find effective information-sharing strategies. Cybersecurity analysts will play a key role in this spectrum.
Genre Analysis
The method of communication hinges on location, type of industry, and experience of the professional. Nevertheless, cybersecurity analysts typically connect through online forums based on specific industries and locations. As observed by Swales (218), genre analysis forms one of the methods that a particular discourse community can be determined. This is critical in discerning the level of an organization’s cybersecurity protocols.
An example of a cybersecurity report: https://www.finra.org/sites/default/files/Cybersecurity_Report_2018.pdf
This is a cybersecurity report from the Financial Regulatory Authority. The report specifically addresses the different stakeholders in the financial services industry. The primary reason for this report is to reveal the different cybersecurity threats that the stakeholders are primarily exposed to while they undertake their duties in their normal operations. The report is introduced by acknowledging the efforts of the financial regulatory authority in regards to containing the issue of cybersecurity in the contemporary world that has threatened effective utilization of the cyberspace in the creation of value to the stakeholders.
The report is constructed with the use of strong language from the cybersecurity discourse family, which has given it an authoritative approach in relation to the presentation. Similarly, the visuals used to further enhance the tone of the report and user engagement are also quite effective and perfectly resonate with the goal of this discourse community in relation to containing cybersecurity threats like phishing and ransomware. Similarly, the tone used in this report is objective, which is also essential in maintaining clarity in this specific discourse community. For one to design an effective cybersecurity report an individual needs to well-conversant with the different types of cybersecurity threats with the relevant technology used in handling each. Most of the information relating to cybersecurity threats are available on the internet and can be easily accessed through Google.
From this report, it is evident that the members of this discourse community are primarily interested in containing cyber-attacks. Through this, the several stakeholders involved in this discourse community are to rally their effort in ensuring all technological systems and procedures are free from this menace. Similarly, writing in this industry should also channel the different ideas involved in helping to generate a solution to this problem. Eliminating of cyber-attacks is a significant theme in the contemporary world in which cybersecurity analysts must rally their efforts together to generate a viable solution.
Threshold for Members
Cybersecurity experts need a mix of technical and soft skills to be considered as insiders in this discourse community. Swales (224), observed that the distinction between insider and outsider is not absolute but lies on gradation. This also presents the challenge of insider threats in this particular discourse community. Technical skills require a person to be trained in information systems, project management, cryptography, Linux, and risk evaluation, and management (Cybersecurity: A Pre-History, 2012). Acquisition of soft skills requires personal effort whereby one practices every day through social interactions and networking. At a minimum, cybersecurity analysts require a bachelor’s degree in information systems, programming, computer science, or a related discipline. Many organizations require much experience working in IT or, as a network, database, or systems administrator. Further, one gains an added advantage if they have professional certifications like CISA. A survey of the job openings for cybersecurity analysts reveals that most companies are looking for analysts who have 3 to 5 years of work experience. A person needs to have a solid It-related work experience to get a job as an information security analyst. On that note, internships play a key role for young professionals looking to gain work experience.
Participatory Mechanism
The area where a member of this discourse community should have the strongest understanding is organizational data as it is related to cybersecurity. “Participatory mechanism general underlines how individuals in a particular discourse community utilize the informational opportunities presented to them (swales, 221).” This dictates how members of this discourse community utilize the information for proper technical control and inventory control. Numerous organizational capacities are critical towards the procurement procedure like the plant, sales area, company code, credit control area, shipping point, and storage location. The amalgamation of these areas helps to fulfil the procurement process; this can only be achieved with the use of high quality that is tailored to the needs of the fulfilment process. Many governments and businesses, and even individuals, have taken steps to deal with this issue, including efforts at policy. But, many of these efforts have many times proved limited, perhaps due to an isolationist tendency, that is, a tendency to fight cybercrime alone. But, as circumstances continue to prove, no entity can fight cybercrime alone, and governments need the help of cybersecurity analysts
An area whereby many cybersecurity analysts have a weak understanding is the credit fulfilment process as it entails sophisticated cybersecurity processes. Most members do not have a good understanding of this concept since it mixes concepts of business and cybersecurity. People are especially challenged by the business aspect of it. The area of weakness means that a member who hopes the discourse community should focus on is the business credit process and cybersecurity as it will give me an edge in the job market. Businesses use the credit management process to examine whether a client should be given credit to purchase and receive the merchandise before payment. The process is tailored to enable this examination at three areas during the process of fulfilment; (1) when the sales order is made or revised; (2) when the delivery is approved or changed; (3) when the post goods issue is done in the course of shipment. The procedure can further be adjusted to acknowledge different criteria when making this examination, which includes the percentage of current receivables from the client, and the amount and number of open sales orders, open deliveries, and scheduled deliveries. Further, third-party companies that provide credit data can also be used. Understanding this process and how it relates to cybersecurity will enable a professional to be a pioneer in the discourse community and stand out in the field since many cybersecurity analysts do not have this knowledge.
Conclusion
Cybersecurity analysts plan and deploy security strategies to safeguard an organization’s systems and networks. The increase in cyber-attacks has necessitated the need for organizations to employ cybersecurity analysts who come up with strategies to mitigate cyber threats. A person trained in cybersecurity has bright job prospects since many companies are looking for such professionals. As national security becomes increasingly by cyber threats, cybersecurity analysts are going to play an important role in national security plans through multi-sector partnerships
References
Aina, M, & Jung, E (Eds.) (2016). Evolving US cybersecurity policy: a multi-stakeholder approach. Task Force Report: Henry M. Jackson School of International Studies University of Washington, Seattle.
Cybersecurity: A Pre-History. (2012). Intelligence and National Security, 27 (5), 781-799. Retrieved from https://doi.org/10.1080/02684527.2012.708530
Dawson, J., & Thomson, R. (2018). The future Cybersecurity Workforce: Going beyond Technical Skills for Successful Cyber performance. Frontiers in psychology, 9, 744. Retrieved from https://www.frontiersin.org/articles/10.3389/fpsyg.2018.00744
Fruhlinger, J. (2019). What is cybersecurity? Definition, frameworks, jobs, and salaries. CSO (online). Retrieved from http://ezproxy.liberty.edu/login?url=https://search-proquest-com.ezproxy.liberty.edu./docview/2322004860?accountid=12085
Marguleas, O. (2016). Sharing of information: establishing public-private partnerships, and creating effective institutions. In M, Aina & E, Jung (Eds.), Evolving US cybersecurity policy: a multi-stakeholder approach. Task Force Report: Henry M. Jackson School of International Studies University of Washington, Seattle
Ryan, N. J. Philos. Technol. (2018). 31:331. Five Kinds of Cyber Deterrence. Retrieved from https://doi-org.ezproxy.liberty.edu/10.1007/s13347-016-0251-1
Roesener, A. G., Bottolfson, C. & Fernandez, G. (2014, November-December). Policy for U.S. Cybersecurity. Air & Space Power Journal, 286 (6), 38+. Retrieved from https://link-gale-com.ezproxy.liberty.edu/apps/doc/A390996309/AONE?u+vic_liberty&sid-AONE&xid=ebd6c764
Sobolewski, M, & Bae, S. (2016). Privacy and concerns and cybersecurity strategy. In M, Aina & E, Jung (Eds.), Evolving US cybersecurity policy: a multi-stakeholder approach. Task Force Report: Henry M. Jackson School of International Studies University of Washington, Seattle
Top of Form
Swales, J. (1987). Approaching the Concept of Discourse Community.
Bottom of Form