Information Security as a Career Field

In: Business and Management

Submitted By oabadom85
Words 662
Pages 3
Information Security as A Career Field
Onyeka Emmanuel Abadom
Saint Leo University

My chosen career is Information Security. Information security is standards, technologies, and policies that are practical to sensitive data to keep it safe. In deciding to purse to this particular path a couple questions had to be considered: Why is keeping information secured significant? Why do I want to enter into this field?
The first question was without a doubt the simplest to answer. With the ever increasing threat of information theft and mal use, more and more organizations and companies are opting to fortify information security. Today our rapidly evolving high tech society wards concerns of the proper use of personal data. To stay ahead of evolving schemes to defraud and defame, organizations are placing security as their number one priority in the fight to keep their customer’s information secure. “Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire; it wafts across the electrified borders” (The Open University, 2013). A company’s information base is the heart of its success. The information base is what makes the expansion of goods, resources and clientele possible. Keeping this bit of information in mind it is essential that security remain the imperative precedence of every establishment.
I chose this career because of a personal need that I feel to combat cyber “terrorism”, diversity, and of course salary.
Every day a new and intriguing way to stop the misuse of data is developed. These means are rapidly established so that even the things that we cannot see but have the potential to cause a great deal of distress are being safeguarded at all cost. I feel as though I have a lot to offer in the realm of cyber security and the improvement of security software development in the military and any other career that I…...

Similar Documents

Information Security

...JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES LABORATORY MANUAL TO ACCOMPANY Security Strategies in Windows Platforms and Applications 1E REVISED 38542_FMxx.indd i 9/5/12 10:48 AM World Headquarters Jones & Bartlett Learning 5 Wall Street Burlington, MA 01803 978-443-5000 info@jblearning.com www.jblearning.com Jones & Bartlett Learning books and products are available through most bookstores and online booksellers. To contact Jones & Bartlett Learning directly, call 800-832-0034, fax 978-443-8000, or visit our website, www.jblearning.com. Substantial discounts on bulk quantities of Jones & Bartlett Learning publications are available to corporations, professional associations, and other qualified organizations. For details and specific discount information, contact the special sales department at Jones & Bartlett Learning via the above contact information or send an email to specialsales@jblearning.com. Copyright © 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The Laboratory Manual to accompany Security Strategies in Windowa Platforms and Applications is an independent publication and has not been authorized, sponsored, or......

Words: 25969 - Pages: 104

Information Security

...IT SECURITY All of new technologies of the modern age have changed the way the human race commutates with other human beings. Also, this feat has made the way business is conducted today very convent and easier to do. The Internet is a huge discover for mankind for the commutation barrier. With all of these new products like smartphones, tablets, and computers made this new capability for anyone in the world that can afford at least one of these products. Since this new commutation barrier is being used daily by the human race, this very much-changed the “business world”. Databases of your personal information, such as credit card numbers, social security numbers, and even your address are on the Internet somewhere. IT has proved to be a significant employer. Many people with knowledge of computers have got jobs in this field, and have successfully made a career out of it. Since it has changed the business world in such a dramatic way, Corporations need employees that have the skill to protect this values and private information. Information technology has helped one find cures for several diseases; thereby, serving mankind in plentiful ways. Many other programs have helped individuals that have visual or hearing impairment. Corporations use information in databases to run operating activities day to day. In the world we live in today information technology is only becoming more and integrated in our daily lives, as we know it. To the......

Words: 1443 - Pages: 6

Information Security

...Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...)[1] Two major aspects of information security are: IT security: Sometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory (even a calculator). IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems. Information assurance: The act of ensuring that data is not lost when critical issues arise. These issues include but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists.......

Words: 447 - Pages: 2

Information Security

...Information security means protecting information and information systems from unauthorized access, use, disclosure, modification or destruction. Since the early days of writing, heads of state and military commanders understood that it was necessary to provide some mechanism to protect the confidentiality of written correspondence and to have some means of detecting tampering. For over twenty years, information security has held confidentiality, integrity and availability as the core principles of information security. Confidentiality is the term used to prevent the disclosure of information to unauthorized individuals or systems. Confidentiality is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds. In information security, integrity means that data cannot be modified without authorization. When Management chooses to mitigate a risk, they will do so by implementing one or more of three different types of controls. Administrative controls form the framework for running the business and managing people. Logical controls (also called technical controls) use software and data to monitor and control access to information and computing systems. Physical controls monitor and control the environment of the work place and computing facilities. Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called......

Words: 4064 - Pages: 17

Comparing Multimedia and Design Career Fields

...Design Career Fields Ashley Raybuck DeVry University English 227 October 17, 2013 Table of Contents Page Introduction …………………………………………………………………………………………………2 Web Design versus Graphic Design What is the difference? .........................................................................................................3 Skill Sets……………………………………………………………………………………………...3 Work Environment Web Design………………………………………………………………………………………….4 Graphic Design……………………………………………………………………………………..5 Educational Requirements Web Design…………………………………………………………………………………………5 Graphic Design…………………………………………………………………………………….5 Projected Career Outlook Web Design…………………………………………………………………………………………6 Graphic Design…………………………………………………………………………………….6 Salary Web Design………………………………………………………………………………………...6 Graphic Design……………………………………………………………………………………6 Conclusions and Recommendations…………………………………………………………………7 References…………………………………………………………………………………………………8 Introduction When choosing a career path, it can be a bit intimidating. There is lots of information to sift through, such as salary, education needed, what skill sets are required, what is the work environment like, and the list can go on and on. It also can be a bit difficult because each person wants to make sure that not only can they support themselves or their family, but will they be happy with this choice for, sometimes, the rest of their lives? Choosing can be a difficult decision, but with the right information, it......

Words: 2083 - Pages: 9

Information Security

...production from the worm outbreak last month, and they directed us to improve the security of our technology. Gladys says you can help me understand what we need to do about it.” “To start with,” Charlie said, “instead of setting up a computer security solution, we need to develop an information security program. We need a thorough review of our policies and practices, and we need to establish an ongoing risk management program. There are some other things that are part of the process as well, but these would be a good start.” “Sounds expensive,” said Fred. Charlie looked at Gladys, then answered, “Well, there will be some extra expenses for specific controls and software tools, and we may have to slow down our product development projects a bit, but the program will be more of a change in our attitude about security than a spending spree. I don’t have accurate estimates yet, but you can be sure we’ll put cost-benefit worksheets in front of you before we spend any money.” Fred thought about this for a few seconds. “OK. What’s our next step?” Gladys answered, “First, we need to initiate a project plan to develop our new information security program. We’ll use our usual systems development and project management approach. There are a few differences, but we can easily adapt our current models. We’ll need to appoint or hire a person to be responsible for information security.” The Need for Security Our bad neighbor makes us early stirrers, Which is both healthful and good......

Words: 24411 - Pages: 98

Information Security

...Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...)[1] Two major aspects of information security are: • IT security: Sometimes referred to as computer security, Information Technology Security is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory (even a calculator). IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems. • Information assurance: The act of ensuring that data is not lost when critical issues arise. These issues include but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. One......

Words: 768 - Pages: 4

Information Security

...Internet Information Security: The Problems and Solutions Chenlong Wu PRE-SESSIONAL COURSE July 2011 The Language Centre EFL Unit University of Glasgow Introduction: As a useful instrument in modern life, the internet has revolutionized life styles in recent years. Generally, the internet popularization over the world facilitates academic research, communication and entertainment. Nevertheless, problems exist in various aspects, such as misuse of the Internet, Internet addiction and information security, which includes individual privacy, business secrets and national information. According to the data provided by The World Bank (2011), 83.2% people have access to the Internet in the United Kingdom until 2009, but there was almost nobody surfing the Internet 20 years ago. Although increasing number of consumers are using the high technology, individual privacy and business secrets are exposed to potential risks. This essay aims to analyse the consequences of the problem and propose possible methods. Firstly, the essay will describe the major problems currently. Then discuss executable measures to address the problem. Finally, it will provide evaluation and conclusion. Problems: Internet information security is a new concept which for the purpose of protecting personal, commercial or national information on the internet, and guaranteeing privacy and business secrets not being destroyed or leaked out. Online privacy contains private information......

Words: 1376 - Pages: 6

Information Security

...Information Security August 10, 2012 One of the biggest issues in the Information Technology field these days is information security. Today almost anything can be found on the internet. Even like how to videos on how to put in a window, break-into a house, or even hack computers. The digital age has many perks but it also has many down falls to it as well. The perks that we enjoy so much from the internet also leaves us open to identity theft and company information theft. This gives Information Technology professionals a lot to think about when they consider Information Technology. One of the biggest threats facing the IT industries today is the end users non-malicious security violations that leave companies vulnerable to attack. In a recent Computer Security Institute survey, 41 percent of the participating U.S organizations reported security incidents. (Guo, 2012 p. 203-236) Also according to the same survey it was found that 14 percent of the respondents stated that nearly all of their company’s loses and or breaches were do to non-malicious and or careless behavior by the end users. (Guo, 2012 p. 203-236) Some of the end users behaviors that help these threats along were the peer-to-peer file-sharing software installed by the end user that might compromise company computers. Some other examples of security being compromised by end users would be people that use sticky notes to write there passwords down and leave them where other people can see......

Words: 1422 - Pages: 6

Exploring Information Technology Careers

...Exploring Technical Careers PGCC Abstract In this paper I will be comparing three information technology careers and determine which one will be the most beneficial. Showing how each job ranks and how I qualified each job will also be shown in this paper. In the end you will see which job actually meet my standards and why I chose the job that I chose. Information Technicians, Cybercrime Investigators and Web Technicians are the careers that I closed took write about. I chose these three careers because they each have something in common. They all require the use of some type of computer. The only difference is the person doing the job, type of computer and what needs to be worked on. Each job was based on a certain criterion and from that I can determine which of the three categorized jobs was better for me or someone else to do that catered to my independent job category and what I prefer to do or of each one. Basically, it's a rating of a job like I would compare cars or a mortgage. Each of the three jobs had a rating and a Weighted Score. All of the jobs I had, I had to rate on a scale of benefits, environment, hours, location, Outlook, qualifications and salary. Then based on the totals determined which one of the three jobs would best fit me for my area of expertise the best and be best in my comfort zone. The information technician is an industrial occupation whose responsibility is maintaining communications and the computer systems. They are responsible......

Words: 1526 - Pages: 7

Information Security

...Principles of Information Security, Fourth Edition Chapter 3 Legal, Ethical, and Professional Issues in Information Security Learning Objectives • Upon completion of this material, you should be able to: – Describe the functions of and relationships among laws, regulations, and professional organizations in information security – Differentiate between laws and ethics – Identify major national laws that affect the practice of information security – Explain the role of culture as it applies to ethics in information security Principles of Information Security, 4th Edition 2 Introduction • You must understand scope of an organization’s legal and ethical responsibilities • To minimize liabilities/reduce risks, the information security practitioner must: – Understand current legal environment – Stay current with laws and regulations – Watch for new issues that emerge Principles of Information Security, 4th Edition 3 Law and Ethics in Information Security • Laws: rules that mandate or prohibit certain societal behavior • Ethics: define socially acceptable behavior • Cultural mores: fixed moral attitudes or customs of a particular group; ethics based on these • Laws carry sanctions of a governing authority; ethics do not Principles of Information Security, 4th Edition 4 Organizational Liability and the Need for Counsel • Liability: legal obligation of an entity extending beyond criminal or contract law; includes legal obligation to make restitution...

Words: 2389 - Pages: 10

Information Technology Career Review

...Professional Plan Bryant & Stratton College Southtowns Campus James Armstrong Network Security Mrs. Sedor March 19, 2014 This paper examines different aspects of the Information Technology field and related career paths. Certain aspects of the IT field were researched and explored in an attempt to learn more about the job market and the IT field. The categories that were explored in each job title were; pay scale, industry growth rate, responsibilities as well as educational background and training. Also examined was the possible over saturation of the job market by qualified but untested applicants in a seriously competitive market. (the number of students expected to graduate versus the projected job market). Information Technology Network Security is an ever changing, growing field of study. One cannot get involved in the careers it encompasses without having a basic love of learning, even on a subconscious level. New technology is constantly being developed and so anyone in the IT field must continually be retrained, for lack of a better term. This holds true even more so for the software side of the field. Consider the firewall or antivirus software, every time the computer system is turned on the system checks for updates to its library of known viruses. That means somewhere on the other end of the internet connection is a network security technician who is constantly researching and investigating new programs and techniques......

Words: 793 - Pages: 4

Information Security

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Analyzing Man-in-the-Browser (MITB) Attacks The Matrix is real and living inside your browser. How do you ask? In the form of malware that is targeting your financial institutions. Though, the machines creating this malware do not have to target the institution, rather your Internet browser. By changing what you see in the browser, the attackers now have the ability to steal any information that you enter and display whatever they choose. This has become known as the Man-in-the-Browser (MITB) attack. AD Copyright SANS Institute Author Retains Full Rights Analyzing Man in the Browser Attacks | 1 Analyzing Man-in-the-Browser (MITB) Attacks GIAC (GCFA) Gold Certification Author: Chris Cain, cicain08@gmail.com Advisor: Dominicus Adriyanto Accepted: December 22nd 2014 Abstract The Matrix is real and living inside your browser. How do you ask? In the form of malware that is targeting your financial institutions. Though, the machines creating this malware don’t have to target the institution, rather your Internet browser. By changing what you see in the browser, the attackers now have the ability to steal any information that you enter and display whatever they choose. This has become known as the Man-in-the-Browser (MITB) attack. No one is safe......

Words: 5973 - Pages: 24

Information Security

...Human differences Human beings are prone to certain characteristics that tend to affect their relation to information security. Information security refers to the ability of an individual to ensure that information is free from any kind of access by unwarranted individuals. There are several human inadequacies that affect the level of information security. However, this discussion is going to concentrate on three major human characteristics that affect information security. These include: acts of omission, acts of commission and acts of sequence. These three acts are important in to information security because they are not related to distortion of information but they increase the challenges in regard to making information secure. Information security involves the ability of an individual to access certain preserved information with ease. Information security does not involve distortion of information. These reasons make these three acts to be a concern to stakeholders within the information security sector. These three acts have distinct influence on the level of security in regard to information. Parsons et.al (2010) argues that acts of omission involve the inability to execute important activities when dealing with information. There are certain requirements in the field of information that require constant activities. For example, it is recommended that one should change his passwords regularly to reduce cases of illegal access by unwarranted individuals (Parsons et.al...

Words: 974 - Pages: 4

Information Security

...implementing the information security management standards, plus potential metrics for measuring and reporting the status of information security, both referenced against the ISO/IEC standards. Scope This guidance covers all 39 control objectives listed in sections 5 through 15 of ISO/IEC 27002 plus, for completeness, the preceding section 4 on risk assessment and treatment.  Purpose This document is meant to help others who are implementing or planning to implement the ISO/IEC information security management standards.  Like the ISO/IEC standards, it is generic and needs to be tailored to your specific requirements. Copyright This work is copyright © 2010, ISO27k Forum, some rights reserved.  It is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.  You are welcome to reproduce, circulate, use and create derivative works from this provided that (a) it is not sold or incorporated into a commercial product, (b) it is properly attributed to the ISO27k Forum at www.ISO27001security.com, and (c) derivative works are shared under the same terms as this. Ref. | Subject | Implementation tips | Potential metrics | 4. Risk assessment and treatment | 4.1 | Assessing security risks | Can use any information security risk management method, with a preference for documented, structured and generally accepted methods such as OCTAVE, MEHARI, ISO TR 13335 or BS 7799 Part 3. See ISO/IEC 27005 for general advice. | Information security risk......

Words: 4537 - Pages: 19