Information Security Analysis Paper

Improved Essays
Writing Assignment 1
Introduction
The widespread access to the Internet has drastically changed the way the world operates and because of this the majority of day to day operations take place over large networks. Therefore, the access allows for these operations to occur at increasing speeds which leads to higher productivity. Although these networks provide convenience for companies and their customers a constant concern which remains will be how to protect the information. Due to rise in traffic on these networks, the compromise of networks has also increased which raises the concerns of how the information will be protected in the future. Another way to define a compromise is known as hacking which is the task of taking over a targeted
…show more content…
For that reason, there has been an increase in protecting this information by companies. A response to these threats is the growth of the network security which focuses on keeping unauthorized users out and protected information so that productivity can be conducted with minimum interruption. Therefore, the sub field in the IT sector, information security analysis focuses on the monitoring and preventing of future attacks and if the attacks are successful the information security analysts will help to examine the attacks, repair the damage, and get the systems back online for their customers. The purpose of this paper is to provide an overview of the growing field of Information Technology with a concentration on security and describes three current positions for employment in the field.
Overview
To add, in the field of Information Security analysts provides support to the operational needs of a network. According t cyberdegrees.org, analysts are/should be able to plan, implement and practice security measures and controls. Analysts should also create and main
…show more content…
as an Information Technology Specialist and requires a top secret clearance. Additionally, provide project management, coordination and oversight on a variety of cybersecurity initiatives and consults with other IT specialists. Also, with the job as an IT specialist with the federal government brings on a large amount of benefits. For example, life insurance, medical insurance, paid holidays, yearly vacations, retirement salary matching, teleworking, and insurance which will remain the same after retirement. In addition, the job with the DOT allows for competitive pay and

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The appearance of the Internet and fast development of the computer play an important role in changing our world into the era of globalization. Communication of computer network has made humankind having the fastest and cheapest data transfer to all over the world, which is symbolized by the Internet (Batinic, 2013). The Internet is by far the most…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In 1776 the founding fathers signed the Declaration of Independence to free themselves from the tyrant King George of Great Britain. This caused a war of independence that freed the people of the United States from an unfair government, but left them in need of leadership. After several failed attempts the leaders of the new nation formed a government that would be free from tyranny. The Founders wrote the constitution to limit the powers of the government to insure that the government would not create a new tyrant.…

    • 551 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Federal Bureau of Investigation (FBI) specialists go about as the lead examiners for matters of national security. These specialists can be called upon to perform numerous capacities, extending from field obligation to look into. FBI operators require past law implementation encounter, a four year college education and specific occupation preparing. This job can be hazardous and may require travel and surprising work hours. This job requires a bachelor’s degree often in criminal justice, complete the FBI training program, and to meet physical fitness standards.…

    • 412 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    “Threat assessments are important decision support tools that can assist organizations in…

    • 626 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Their duties could consist of containment of the substance and then decontamination. Information analysis and infrastructure protection assist in the obtaining and analysis of intel or information, while infrastructure protection has to do with government buildings, utility companies, and banking institutions among other structures. Their role could consist of having contingencies in place when something catastrophic happens to any structure. Alternative structures would be assigned and made available to keep those parts of our country running and accessible. All these entities are part of the Department of Homeland Security, which is there to protect the citizens of the United States of…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Information Security Accountability The are three main areas of accountability when looking at the security of an organization. Whether is be a large corporation or a few person operation, each area to some degree is used by the organization. The three areas include I. T. security, information security and enterprise security (Gelbstein, 2013). I.T. security is security in place that protects an organizations information assets from non authorized person access in order to modify or remove.…

    • 410 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Carry On is a good source of knowledge that gave deep information in the sense of security, it is a great help for readers who are in different fields other than information security. Bruce Schneier has very intimate knowledge about the topic of security. After reading the book we can find the vast information in different ways. The psychology of security is the chapter that is beautiful and meaningful and provides experimental information to the reader, Bruce relates the human mindset and human psychology with security as he tries to represent the similarity and difference with security and human psychology.…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Intelligence in Homeland Security Introduction After the attack of 9/11 on the United States the Nation learned there were many areas that needed improvement in regards to the security of the homeland. The Department of Homeland Security (DHS) had to take into account the lessons learned from 9/11, especially the shortfalls that were seen in intelligence gathering and make some major changes. The DHS is not the only agency that is responsible for gathering information for the Nation’s safety, there are many different national agencies that provide intelligence for homeland security. Some of the National agencies include offices that many have heard of like Customs and Border Patrol, the U.S. Coast Guard or the Secret Service, but there are other National agencies that contribute that most Americans may not know about.…

    • 1699 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Introduction This paper describes seven threats to a network belonging to a fictitious marketing company in Kansas City, Missouri. These threats are based on different IT infrastructure domains. The detail of these threats explains the possible outcomes and endeavors to point out “what is the worst that can happen” from that threat. Threats…

    • 717 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    My Future Career The future career that I choose is a Cyber security expert. The interest that I developed in this career was due to a lot of what I’ve saw in the news over the years and from what I’ve personally experienced over the years. A large majority of companies and government agencies hire these experts to help strengthen networks, safeguard information, or prevent cyber-attacks. That’s the part that really interested me.…

    • 754 Words
    • 4 Pages
    Improved Essays