Monday, 9 May 2011

CyberSecurity


With the vast amount of sensitive data now stored in the digital universe -- everything from social security numbers to financial records and matters of national security -- it is critical that we secure and protect our data from malicious interests. For vital computer networks and electronic infrastructures, cybersecurity experts stand as the last and most effective line of defense against such attacks.
Information systems are under constant threats from hackers, viruses, and worms. Nothing could be more important than protecting the digital world our very lives depend upon.

Cybersecurity will help you become an indispensable industry leader, someone who applies sound security policies to business and government entities, providing protection and disaster recovery to critical control systems. These workers educate users about computer security, install security software, monitor networks for security breaches, respond to cyber attacks, and, in some cases, gather data and evidence to be used in prosecuting cyber crime. The responsibilities of computer security specialists have increased in recent years as cyber attacks have become more sophisticated"
Securing cyberspace and the national information infrastructure is critical and can be achieved only when qualified workers are available.
Monitor use of security systems including firewalls and intrusion detection systems.
·         Create, implement and oversee security policies.
·         Plan disaster recovery for operating systems, databases, networks, servers, and software applications.
·         Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts.
·         Test new security software and/or technologies.
·         Conduct regular compliance audits utilizing cross divisional information security team.
·         Prepare to take the CISSP certification exam
·         Conduct research in information security related fields towards a doctoral program
·         Devise a mitigation plan against both external and internal vulnerabilities to enterprise computer infrastructures and sensitive digital assets.
·         Support multiple risk assessment strategies and processes to maximize effectiveness and minimize costs of CSIA in a high assurance information system.
·         Integrate systems-level-infrastructure thinking into CSIA problem identification and resolution, and effectively communicate the solution.
·         Differentiate among the models, architectures, challenges and global legal constraints of secure electronic commerce technologies used to ensure transmission, processing and storage of sensitive information.
·         Prescribe how to provide message privacy, integrity, authentication and non-repudiation using network security practices and infrastructure hardening techniques.
·         Evaluate and contrast the impact of diverse ethical perspectives, cultural customs and organizational political dynamics on CSIA.
·         Assess, from both a national and global perspective, the relative demands of Internet-openness, legislation and law-enforcement, and individual right-to-privacy.
·         Forecast the impact of continually advancing technology and national and international cyber-legislation on CSIA.
·         Conduct in-depth research into a specific CSIA topic, including finding and integrating relevant research results of others.
·         Generate critical thinking in analysis and synthesis of enterprise and global CSIA issues through effective individual and team graduate-level written and oral assignments.
Produce a successful project using project development skills.

No comments:

Post a Comment