Information Technology Reference
In-Depth Information
Security Specialist
Computer security is among the biggest growth
areas in IT. With this comes a growing demand
for engineers who have the skills to protect
computers and networks. Security specialists
are responsible for ensuring that all the security
devices in a company are correctly configured.
These specialists must also be able to spot dif-
ferent types of attacks and know how to respond
to each one.
To work in this area, you will need to master skills
such as understanding operating systems and
networks. You will also need good computer quali-
fications from a college or university, plus indus-
try certifications from companies like CompTIA
and EC Council. Finally, you will need experience
in other areas of IT, such as troubleshooting and
support, before you can move into this role.
© iStockphoto.com/baranozdemir
Network and Internet
Security.Concerns
Computer crime is becoming increasingly common. It is relatively easy
to attack computers to cause disruption or steal data. In fact, this can
be carried out over a network or the Internet with low risk of the crime
being traced back to the perpetrator.
Because of the ease with which attacks can be launched, it is essential that
you remain aware of security and take the necessary steps to secure your
data and online identity.
Computer security is built around upholding three basic goals:
Confidentiality. Your data should be visible and accessible only to
those whom you choose to see it.
Integrity. The data you see and store should be reliable and
accurate, and should not be tampered with. You need to be able to
trust this data.
Availability. Your data should be accessible when you want it,
including after a mishap or disaster.
The threat assessment and security measures discussed in this chapter
center around the need to uphold these three goals.
Security Threats Posed
by.Computer.Criminals
Computer criminals engage in many types of activities that can compro-
mise your computer system, your data, and your online identity.
Search WWH ::




Custom Search