How To Become A Cyber Security Specialist
How To Become A Cyber Security Specialist.
You have been reading the news about all the recent cyber-attacks, you have an interest in computers and you want to embark on a new career as
a cyber security professional. Where do you start? There are 3 major paths you can take to further your career in information technology and
- Take and Pass Cybersecurity Certifications
- Obtain a Cybersecurity Degree from an Accredited Universit.
- Start by taking this course “Breaking Into Cyber Security” to understand
the Cyber Security landscape and develop a career development plan for yourself.
Victims of recent attacks include such well-known brands as
- Neiman Marcus,
- Michaels Stores,
- JPMorgan Chase,
- Living Social. The list goes on.
The Path to Cyber Resilience
This new approach emphasizes five fundamental steps:
1. Identify your most critical assets—What do you have that is most
valuable to others?
2. Gather intelligence on cyber threats—Who are the bad actors?
3. Understand your digital profile—What does your online activity signal
4. Build a resilient system—What are the most critical elements of
5. Plan for a breach—What can you do now to prepare for a crisis?
Gather Intelligence On Cyber Threats Attacks on physical assets and critical infrastructure
Over the past several years, most publicly reported breaches have
concerned data theft—such as credit cards, Social Security numbers, and patient records. Attacks are now morphing into the realm of physical assets that threaten the critical infrastructure—including electric grids, transportation systems, satellites, civilian nuclear facilities, and
By exploiting industrial control systems and critical infrastructure, cyberattacks now pose a threat to public safety and economic security.
Understand Your Digital Profile
Big Data approach to analyzing cyber risk—the “outside-in” perspective Hackers look for opportunity and probe for weakness—a combination of
the value of your assets and vulnerability of your systems. Big Data can now be harnessed to assess the likely motivation for and potential
susceptibility to cyber events by relying exclusively on data points beyond an organization’s perimeter. This is the outside-in approach. In the digital era, each organization creates a footprint through its online activity. Your business, just like an individual, leaves a trail of digital