Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
 Interview people to gather information  Collect evidence to present in court  Find facts and analyze information about legal, financial, and personal.
Written by Elizabeth Salyers. Lawyer Police/Detective Criminal Investigator/Special Agents.
Future Jobs Denton MacDonald. Possible careers Architect Plan and design buildings and other structures Information Security Analyst Help ensure the security.
Chapter 11 Security and Privacy: Computers and the Internet.
© UNT in partnership with TEA1 7 th Grade Career Exploration Module Career Focus: Video Game Programmer Occupation.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Firefighter Created by The University of North Texas in partnership with the Texas Education Agency.
The future Job Market By Starr Marcellino. Cyber Security Specialist  Education: to become a cyber security specialist bachelor’s degree in computer.
1 Computer Support Specialists and Systems Administrator.
© UNT in partnership with TEA1 7 th Grade Career Exploration Module Career Focus: Computer Hardware Engineer.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Database Administrator Career Information Copyright © Texas Education Agency, All rights reserved.
Broadcast Technician Occupation PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
© UNT in partnership with TEA1 7 th Grade Career Exploration Module Career Focus: Computer Software Engineer.
All About Construction Managers Career Information UNT in partnership with TEA, Copyright © All rights reserved.
Public Relations Manager Vocabulary PowerPoint Created by the University of North Texas in partnership with the Texas Education Agency.
Sound Engineer Created by The University of North Texas in partnership with the Texas Education Agency.
Occupation PowerPoint
Broadcast Technician e-book Created by The University of North Texas in partnership with the Texas Education Agency.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Computer Hardware Engineer Occupation PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
The Law of Supply and Demand Created by The University of North Texas in partnership with the Texas Education Agency.
Legal Secretary Vocabulary PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
© UNT in partnership with TEA1 7 th Grade Career Exploration Module Career Focus: Electrical Engineer.
Advertising Manager E-Book Getting the Product Recognized and Sold Created by The University of North Texas in partnership with the Texas Education Agency.
Sound Engineer Occupation PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
© UNT in partnership with TEA1 7 th Grade Career Exploration Module Career Focus: Video Game Programmer.
Computer Software Engineer e-book Created by The University of North Texas in partnership with the Texas Education Agency.
Personal Financial Advisor Helping you Save and Spend UNT in partnership with TEA, Copyright © All rights reserved.
Copyright Laws and Regulations Vocabulary Created by The University of North Texas in partnership with the Texas Education Agency.
All About Construction Carpenters Created by The University of North Texas in partnership with the Texas Education Agency Career Information.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Crime Scene Investigator Occupation PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
McGraw-Hill/Irwin © 2002 The McGraw-Hill Companies, Inc. All rights reserved. C H A P T E R Haag Cummings McCubbrey Third Edition 8 Protecting Information.
Created by The University of North Texas in partnership with the Texas Education Agency.
Graphic Designer Occupation PowerPoint Created by The University of North Texas in partnership with the Texas Education Agency.
Occupation PowerPoint
Real Estate Agent Finding and Selling Homes UNT in partnership with TEA, Copyright © All rights reserved.
Lawyers Created by The University of North Texas in partnership with the Texas Education Agency.
All About Geoscientist Created by The University of North Texas in partnership with the Texas Education Agency Career Information.
So You Want to be an Construction Carpenter Created by The University of North Texas in partnership with the Texas Education Agency.
All About Civil Engineers Career Information UNT in partnership with TEA, Copyright © All rights reserved.
Interior Design License Requirements
Scott Charney Cybercrime and Risk Management PwC.
Chap1: Is there a Security Problem in Computing?.
Welcome Topic : Security.
Crime Scene Investigation Forensic Science. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with.
My audience will be excited to learn the basics of what a network systems & data communications analyst does.
Computer Security By Duncan Hall.
Noemi Saenz Info Tech 5 th. Job Title  Analyze users' needs then design test & develop software to meet those needs.  Design & plan each piece of application.
Safe’n’Sec IT security solutions for enterprises of any size.
 Monitor their organization’s networks for security breaches and investigate a violation when one occurs  Install and use software, such as firewalls.
Copyright © Texas Education Agency, All rights reserved. Architectural Design Architectural Models.
Info Tech. Period 3.  Computer Programmers write computer languages like JavaScript and Jscript  They Debug programs by testing and finding errors.
WELDING: Semester Review Copyright © Texas Education Agency, All rights reserved.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Information Security and Privacy in HRIS
Career JEOPARDY! Cluster: Information Technology
Roles and Functions of Private Security
Computers: Tools for an Information Age
Firewalls and Security
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

The growing demand for Computer Security Specialists is due to greater computer use and the need to protect computer information. UNT in partnership with TEA, Copyright © All rights reserved. 2

Computer Security Specialists plan and implement security measures that protect and prevent unauthorized use or destruction of computer information. UNT in partnership with TEA, Copyright © All rights reserved. 3

They monitor reports of computer viruses and decide when to update virus protection systems. UNT in partnership with TEA, Copyright © All rights reserved. 4

They set up programs to detect hackers, and they take steps to prevent hackers from gaining access to a system. UNT in partnership with TEA, Copyright © All rights reserved. 5

They encrypt data and erect firewalls to conceal confidential information as it is being transmitted. UNT in partnership with TEA, Copyright © All rights reserved. 6

They often provide technical support and assistance and educate users on computer security measures. UNT in partnership with TEA, Copyright © All rights reserved. 7

They monitor security breaches, respond to cyber attacks, and sometimes gather evidence to be used in prosecuting cyber crime. UNT in partnership with TEA, Copyright © All rights reserved. 8

Computer Security Specialists are hired by corporations, banks, airlines, hospitals, school systems, universities, and government agencies. UNT in partnership with TEA, Copyright © All rights reserved. 9

A bachelor’s degree in computer science or information systems and computer-related experience is generally preferred by employers. UNT in partnership with TEA, Copyright © All rights reserved. 10

Computer Security Specialists usually work 40 hours a week in nice offices, but they also have to be on call at all times in case of emergencies. UNT in partnership with TEA, Copyright © All rights reserved. 11

Computer Security Specialists are in great demand, and the average starting pay is about $65,000 per year. UNT in partnership with TEA, Copyright © All rights reserved. 12