Journal logo

Securing the Web

The how and why of getting a job in cyber security.

By Robert CordrayPublished 5 years ago 3 min read
1

Cyber security is a field that deals with technology, the internet, and the security threats that can come from the Internet. The Chatham House stated that "cyber security also examines security strategies for combating cyber crime and other cyber threats to critical infrastructure, such as civil and military nuclear facilities." If a person understands cyber security they can use their skills to help protect computers and systems from hackers that are trying to disrupt the system or gaining unauthorized access to the system to gain benefits from the information contained inside the targeted system. Since cyber security is a very broad field, one can't know everything within the field. Cyber security involves fields like ethical hacking, security analyst, policies and cryptography, security researcher and many more.

About Cyber Security

Ethical hacking has to do with writing code or malware in assembly language and analyzing malware. These three things are very difficult to understand and can take a lot of time to learn, however, there are many cyber security services out there that can help to understand more about cyber security topic or consult organization on the security needs of the business but those services. If a person wants to save a trip to one of these businesses they should learn as much as they can about cyber security and seek help from people who are in the same field when they are stuck. Do not try to master everything because there is simply too much information for one person to learn it all. Focus and perfect your niche in cyber security and others will do the same.

Experience VS School

The best way to learn cyber security is to learn it as you work in the field because the experience can teach a person more than theories can. School cannot teach everything about cyber security because it is a growing field and if a person is into cyber security they would know that there is no one way to secure a system because a system is only as secure as the person who designed it. If a hacker is dedicated enough they will find a vulnerability in the system and will be able to exploit it. To be good in cyber security, one must never stop learning new ways to secure their infrastructure from threats because everyday hackers are looking for ways to gain unauthorized access to the person and business organization to steal information to either make money or embarrass the person or organization. But going to school is simply not enough because a school can only teach things like policies, privacy, law and governance, and some technical skills, but since the field is constantly growing and with new threats being discovered all the time, a person in this field must always be updating their information.

Internet of Things

With the rise of mobile phones and tablets, it also introduces new threats to personal and business information systems and infrastructure. According to Aerohive "guest devices as well as IoT and BYOD, need to be securely on-boarded and provisioned with the access right appropriate for their roles" because people bringing their device to the workplace and connecting them to the Internet do not have the security standard that meets corporate security standards, so it is up to the organization to come up with a plan in order to protect themselves from these devices. According to Deloitte, although it is good to have IoT because it "offers new ways for the business to create value, with the constant connectivity and data sharing can also cause the information to be compromised" if not carefully analyzed.

Conclusion

In conclusion, it is recommended that all cyber security professionals never stop learning new things about cyber security, even though it is not possible to master everything but it does help to update to new information whenever possible to help protect not only their information, but also their organization information.

career
1

About the Creator

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.