Essay 4 (Essay 3 Revised Philip)
docx
keyboard_arrow_up
School
Kenyatta University *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
5
Uploaded by DeanScienceOyster10
Personal Career Options and Training Required.
In today's rapidly evolving technological landscape, the significance of data security has
never been more critical. With the increase in digital threats and information breaches,
associations and people need professional experts who can protect their sensitive data. As
organizations depend progressively on digital infrastructure, the role of data security analysts has
become basic. These professionals are entrusted with distinguishing vulnerabilities, eliminating
digital threats, and bracing advanced scenes against potential breaches.The significance of
information security analysts stretches out past the domain of technlogy, reverberating with
timeless themes investigated by William Shakespeare and Christian. As technology keeps on
progressing at a remarkable speed, the significance of defending sensitive information and
computerized framework turns out to be progressively paramount. Thisessay delves into the
domain of data security analysis, exploring the different points of view introduced by Christian's
alignment Issue and
Shakespeare's Midsummer Night's dream
. By scrutinizing these
perspectives, we plan to observe how these thoughts can both enhance and challenge the pursuit
for a profession as an information security analyst.As an aspiring information security analyst,
myjourney is naturally attached to an interest with the perplexing link between technology and
security.. The decision to embark upon this career path is not only rooted in a passion for
deciphering digital vulnerabilities but also in the profound desire to contribute to the preservation
of a secure online environment. From a perspective of Christian's Alignment Issue, I plan to
investigate how aligning ethical considerations to the fast development of technology can
enhance the viability of data security pratices. Moreover, I will figuratively compare these
thoughts with components from Shakespeare's
Midsummer Night's Dream
, researching the
interplay
between chaos and order, illusion, and reality, within the realm of information security.
This essay will dive into the alignment issue's implications for moral dynamic inside the
data security field. It will likewise analyze Shakespearean representations to observe how the
fragile balance between unique components resounds with the challenges and triumphs that
information security analysts encounter.. Through this analysis, It we will unwind the expected
collaborations between these philosophical thoughts and the viable quest for a data security
analyst career, revealing insight into the way I envision for my personal and professional growth
in this dynamic domain.This analyses the alignment problem, a concept proposed by Brian
Christian, and its relevance to Information Security Analyst career. In addition, it draws also
from Shakespeare's play
"A Midsummer Night's
Dream
" to figuratively examine the difficulties
and opportunities to experience in this profession. As a student with a passion for technology and
a desire to make a difference, the aim is to pursue a profession as an Information Security
Analyst. “The development of artificial intelligence has profoundly changed the education, work
and life of human beings”(
Yan, Fuhua, et al.)
.
This decision lines up with my current instructive
and professional objectives because of its basic nature in the digital era By investigating
Christian's Alignment Issue and its possible applications in getting ready for and setting out upon
a career in Information Security Analyst.
Choosing a career is one of the most significant milestones in one’s life. This decision has
the power to define your sense of purpose and shape your future. You ought to choose a career
that aligns with your goals, purpose, and desires. Information security analysis is a profession
that I am very passionate about since I am very interested in technology and cyber security. For
career guidance, I looked at the Occupation Outlook Handbook. I had three career options; my
first choice career which was Information security analyst. The quote from the Occupational
Outlook Handbook (OOH) that resonated with me concerning my first career choice, which is
Information Security Analyst was; “Employment of information security analysts is projected to
grow 35 percent from 2021 to 2031, much faster than the average for all occupations.” This
shows that there is a great demand for this profession. This information is very essential, as it
will help me to prepare to be competitive and relevant in the job market. My career of
comparison was computer programming.
“Computer programmers write, modify, and test code
and scripts that allow computer software and applications to function properly.” This career is
closely related to information security analysis but different. Computer programmers are
responsible for maintaining software programs while information security analyst safeguards
computer systems. Lastly, my career of contrast, being a chiropractor. “Opportunities for
chiropractors also will be created by the continued aging of the large baby-boom generation.”
This quote from Occupation Outlook Handbook shows that the demand for chiropractors will
increase as they care for the needs of aging baby boomers who have already reached retirement
age.
Choosing the right school to pursue your career is very essential. Your decision is very
significant as it determines your future success and satisfaction. When choosing the right school
to pursue your career one should consider preferences, goals, and individual needs. I researched
three colleges, which offered a major in information security analysis. Among the three; The
University of Pennsylvania is the college that seems best for me. This university is a very big
research institution; I will be able to conduct extensive research in my career path. The
University of Pennsylvania writes, “In the Master of Science in Cybersecurity Analytics and
Operations program, you will engage a deeper understanding of cybersecurity analytics and
operations by blending education relating to technology, incident response, strategic planning,
and crisis management.
Furthermore, I looked at Lindenwold University. However, this
institution might be a great college for me but it is more expensive compared to Pennsylvania
University. Despite the fee, Lindenwold University offers quality services and value for your
money. Lindenwold University writes, “Your coursework covers technology and business
concepts to give you a well-rounded foundation for leadership in cybersecurity.” My goal is to go
to a college that is near where I live, therefore, Boise State University, would not be a location of
choice, as it is too far from Pennsylvania. Regardless, Boise State University is a good college
that offers competitive programs. Boise State University writes,” Our cutting-edge programs
equip progressive organizations and busy professionals with new knowledge and skills to address
dynamic work challenges.” As much as the goals and objective are great, the distance is an
inconvenience. Nevertheless, learning more about career choices from experts is critical.
Interviewing experts in your career field can be very valuable; you gain more insight and
knowledge from their experiences. Experts have deep knowledge and experience that they have
gained over the years. They can offer personalized guidance, and provide valuable insight that
helps you approach problems from a different perspective. They make you understand better
about the career you are pursuing. I had the previledge of talking to various experts in my fields
of interest. First, I taked to Alex Smith, an expert in Information Security. He had the following
to say, something key that I picked,
“Information security analysts are like digital protectors,
always working hard to keep computer data safe from bad guys” (Alex Smith. Interview.
Conducted by Phillip Han. 7 Aug 2023). Information Security Analysts are experts liable for
safeguarding an association's computer systems and networks from security breaches and digital
threats. Another expert I talked to said, “They work to recognize likely weaknesses, create and
execute safety efforts, and respond to cyber incidents promptly. Information security analysts
defend the online world; stopping cyber troubles and making sure things stay secure” (Maya
Patel. Interview. Conducted by Phillip Han. 7 Aug 2023). Information security analysts assume a
basic part in shielding sensitive information and guaranteeing the congruity of tasks for
organizations and government offices.
Lastly, Jordan Davis, also an experienced cyber security
analyst said to me, “Think of information security analysts as the guards of secret information,
stopping hackers and keeping important data safe and sound” (Jordan Davis
.
Interview.
Conducted by Phillip Han. 7 Aug 2023). Information security program equips one with the vital
specialized abilities and information to address the advancing difficulties in technology and AI
systems.
Apart from experts and institutions that I have interacted with, Brian Christian has written
extensively on Artificial Intelligence (AI) and information security in
The Alignment Problem
.
Christian investigates the moral ramifications of AI and AI systems. The alignment issue alludes
to the test of guaranteeing that AI systems align with human qualities and objectives. Christian
writes “…research shows that humans place greater trust in transparent models, even when those
models are wrong and ought not to be trusted” (Christian 319). This shows that there is a need
for more Information security analysts to ensure that the AI models are transparent and can be
trusted. As technology continues to advance, more professional information security
professionals will be needed to protect against cyber threats. The inability to resolve this issue
can prompt unseen side effects and possibly hurtful results. The alignment problem in AI bears
significance to the field of Data Security. As technology advances, artificial intelligence, and AI
models are incorporated into security systems to independently identify and answer threats.
Christian further writes, “Transparency—the ability to understand what’s going on inside a
machine-learning model and why it behaves as it does” (Christian 90). This can be connected
with a data security analyst concerning their work with AI models and their suggestions for
network protection. In the domain of cyber security, AI models are progressively being utilized
to identify and answer different dangers and assaults. “Programming computers to learn from
experience should eventually eliminate the need for much of this detailed programming effort.“
( Christian 126 ). Christian proves how some careers may be in danger, while others are using
AI’s intelligent experience as a huge benefit.
These models can investigate a lot of information, recognize examples, and settle on
choices to safeguard frameworks and organizations from likely threats. Guaranteeing that these
frameworks' decisions line up with human qualities is significant to forestall inadvertent
mischief. “Artificial intelligence (AI) has as its aim the creation of intelligent machines” (Russell
2). In addition, understanding the moral ramifications of AI models is fundamental in keeping up
with transparency and responsibility in the online protection space Emphasizing ethics will
enhance the ability to approach cybersecurity challenges responsibly and make informed
decisions that align with human values.
A classmate wrote, “
The user of the AI models can gain
a better understanding by generating detailed and interpretable outputs” (Classmate’s post). It is
significant to have systems in place that are safe and functional at the same time.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Furthermore. Shakespeare's
A Midsummer Night's Dream
is a play set in a magical realm,
loaded up with charm and unpredictable events. Essentially, the world of cyber security is much
the same as a magical realm, where foes consistently develop their strategies, and unforeseen
dangers arise. "The course of true love never did run smooth” (Lysander in Act 1, Scene 1). This
shows that Artificial intelligence has its own set of complexities and challenges. Even though
Artificial intelligence can be of great benefit when the AI models are not in line with human
values. There is also a challenge to ensure that AI models run smoothly due to the challenges
posed by vulnerabilities and potential threats. “AI systems should empower everyone. They must
be equally accessible and comprehensible to all employees regardless of disabilities, race,
gender, orientation, or cultural differences” (Sun 4). In cybersecurity, the exploitation of
vulnerabilities can have a similar effect, enabling hackers to gain unauthorized access and
manipulate systems.
In the text, Shakespear notes, “So quick bright things come to confusion”
(Lysander in Act 3, Scene 2). The rapid advancement of technology and AI could lead to both
unintended consequences and positive innovation depending on how they are managed.
In conclusion, the role of an Information Security Analyst is of utmost importance in
today's digitally connected world. There is a need for a comprehensive understanding of the
ethical dimensions brought forth by Brian Christian's Alignment Problem. It will be essential to
ensure that AI-powered security tools align with human values, promoting transparency and
accountability. In today's rapidly evolving technological landscape, the significance of data
security has never been more critical. With the increase in digital threats and information
breaches, associations and people need professional experts who can protect their sensitive data.
Information Security Analysts are experts liable for safeguarding an association's computer
systems and networks from security breaches and digital threats. They work to recognize likely
weaknesses, create and execute safety efforts, and respond to cyber incidents promptly.
Information security analysts defend the online world; stopping cyber troubles and making sure
things stay secure. There is a need for more Information security analysts to ensure that the AI
models are transparent and can be trusted. As technology continues to advance, more
professional information security professionals will be needed to protect against cyber threats.
The inability to resolve this issue can prompt unseen side effects and possibly hurtful results. The
alignment problem in AI is significant to the field of Data Security.
Works Cited
Alex Smith.
“
Interview”. Conducted by Phillip Han. 2023, August 7.
Boise State University.
https://www.boisestate.edu/
Christian, Brian.
The Alignment Problem: Machine Learning and Human Values
. W. W. Norton,
2021
Jordan Davis
. “
Interview”. Conducted by Phillip Han, 2023, August 7
Lindenwood University.
www.lindenwood.edu/
Maya Patel. “Interview.” Conducted by Phillip Han. 2023, August 7
Occupational Outlook Handbook.
Encyclopedia of Career Development
, 2023.
Russell, Stuart. "Human-Compatible Artificial Intelligence."
Human-Like Machine
Intelligence
, 2021, pp. 3-23.
Shakespeare, William.
Shakespeare's Comedy of A Midsummer-night's Dream
. 1877.
Sun, Weiping. "Artificial Intelligence and Ethical Principles."
Reconstructing Our Orders
, 2018,
pp. 29-59.
University of Pennsylvania.
www.upenn.edu/
.
Yan, Fuhua, et al. "Academic Planning and Career Choice of Art Doctoral Students in the Era of
Artificial Intelligence."
2019 International Joint Conference on Information, Media and
Engineering (IJCIME)
,
2019.
Brianna Ellis.“3.7, Discussion on the alignment problem and responding to a classmate.”
English
101: College
Reading and Composition 9
, August 2023. LACC Canvas.
Word count with quotes: 2315
Word count without quotes: 1797