Verified Document

The Cyber Security Field Research Paper

Characteristics of the Cyber Security Industry and how they impact employment
Technology is quickly becoming one of the largest and fastest growing industries in the world. As countries become more developed, they will rely more heavily on the efficiencies and benefits derived from technology solutions. Many industry experts believe that data will become the next frontier as it relates to technology and future applications. Due to the technological innovations the possibilities and applications for large amounts of data are just beginning. Currently, organizations such IBM and Google are using data to predict future weather trends, create self-driving cars, or even automating renewable energy outputs within the grid. These technological innovations are designed to not only benefit corporate America, but also improve the quality of life for individuals around the world. The technology industry offers participants a lucrative, high-paying career along with the satisfaction of dramatically improving the lives of others (Bradford, 2017).

Unfortunately, the advancement of technology has brought with its participants who are looking to do harm to others. Cyber warfare, according to some studies has the potential to become the next battleground for rival countries looking to start a war. As technology has increased its prevalence in society so too has the important of cyber security. To help protect the livelihoods of others and the national security interests of America, I have decided to pursue a career within the cyber security industry.

To begin, most participants in the industry are highly skills workers with knowledge of various computing languages and technology infrastructures. Here, a college degree is not necessarily required to work in the industry. However, the individual most be well-versed with computing terminology, software, programming languages and other. As the industry is in its infancy stages relative to other mature industries, there is no set career path. As such individuals from various backgrounds can be successful within the industry so long as they have a passion for technology. Most HR experts however do recommend beginning a cybersecurity career with an internship or apprenticeship. This will allow the new practitioner to become family with industry fundamentals while also learning the basics of database management, coding and networks. Most importantly, an internship will allow an individual to see real-world applications and IT procedures daily. One an individual determines that they are interested in a career in cybersecurity, they must then identify their area of interest. Areas of interest include email security, network security, forensics, security administrator, web security, security software developer, and others (Sundaram, 2017). My interest is security administration. As it relates to personality characteristics of an ideal candidate, many of them don’t vary much from other professions. The individual must be passionate for technology, have a team-oriented mindset, strong communication skills, a strong sense of integrity, and the ability to synthesize large amounts of information to arrive at a conclusion.

Employment prospects within the industry are very favorable. In fact, due the expertise required, there are more available jobs than candidates qualified to accept them. The 2018 Cyber Security Workforce study estimated that there is nearly a 498,000 shortage of cyber security professional in the United States alone (ISC, 2018). As a result, entry level sales are much higher than...…was the idea of continual learning and its importance. Unlike some industries and professions that change processes very slowly, a cyber security profession must constantly learn. In fact, some certification require that the professional engage in continual education credits to keep their certification active. The importance of continual education is paramount to the advancement of the industry and the individual overall. For one, as technology advances so too must the skills and abilities of the cybersecurity profession. If not, the skills of the professional will become obsolete and ineffective at challenging those who would like to harm others. This will have grave implications for our financial system, our healthcare system, and other critical networks that house important information (8 New Horizons, 2018).

When reflecting on the research for this assignment, I thoroughly enjoyed researching the merit of the cybersecurity industry. The research project has only reaffirmed my commitment to the cybersecurity industry and the technology field overall. I believe I possess many of the personality traits and temperament outlined throughout this paper. First, I have a passion for technology and understanding how systems work. I enjoy problem solving and working with others to derive solutions. I also enjoy the fulfillment of knowing that I am helping others through my work, even if they don’t know who I am. However, through this project, I must further develop my interpersonal and psychology skills. Here, I need to better understand how people think and what factors enter their decision-making processes. Overall, through the development of this skill, I believe I will be better prepared for an entry-level position within the industry.…

Sources used in this document:

References:

1. NSA. Criteria for Measurement for CAE in Cyber Operations Fundamental. January 15, 2019 [accessed]. https://www.nsa.gov/resources/students-educators/centers-academic-excellence/cae-co-fundamental/ 12

2. Kuss, Lauren. The cybersecurity Veterans Toolkit. Hire Our Heroes. April 18 2018. https://hireourheroes.org/cybersecurity-veterans-toolkit/ 13 Cyber Seek.

3. Hack the Gap: Close the Cybersecurity Talent Gap with Interactive Tools and Data. January 7, 2019 [accessed] https://www.cyberseek.org/index.html

4. Bradford, Laurence. Career in Cybersecurity. Forbes. February 27 2017. https://www.forbes.com/sites/laurencebradford/2017/02/27/how-to-start-a-lucrative-career-incybersecurity/#7bd253cf1066 20

5. Sundaram, Aurobindo. Security Certifications are Useless, Right? Infosecurity Magazine. March 2017. https://www.infosecurity-magazine.com/news-features/security-certifications-useless/

6. 8 New Horizons. 4 Cybersecurity Career Paths (And the Training to Get You There). July 19 2018. https://www.newhorizons.com/resources/article/articleid/41/title/4-cybersecurity-career-paths-and-thetraining-to-get-you-there

7. (ISC). Cybersecurity Professionals Focus on Developing New Skills as Workforce Gap Widens. 2018. https://www.isc2.org/-/media/ISC2/Research/2018-ISC2-Cybersecurity-Workforce


Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Security Most Important Cyber
Words: 2328 Length: 8 Document Type: Research Paper

The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012). In addition to that, the operating system of Apple is now considered as one of the most favored

Cyber Security Cloud Computing
Words: 1389 Length: 4 Document Type: Term Paper

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

Cybersecurity As an Organizational Strategy an Ethical and Legal...
Words: 3101 Length: 10 Document Type: Research Paper

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Cybersecurity Vulnerability Issues
Words: 2738 Length: 10 Document Type: Research Paper

Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware

Cybersecurity Recent Case Studies of
Words: 4325 Length: 16 Document Type: Term Paper

The level and sophistication of this attack on the Department of Defense's systems suggests that professionals conducted this attack with significant resources at their disposal and an interest in the national security secrets of the United States. The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information. Since the attack, the United States responded in a number of critical ways.

Cyber Security Ethical Issues Associated With Ransomware
Words: 893 Length: 3 Document Type: Case Study

Cyber Security Ethical issues associated with ransomware It is only natural that people who are known to you will send you messages through your email address. It is lost on me how those engaging in ransomware business access information about their potential victims like the email address as to send you messages that have been infected that when opened infect the whole computer. These people engage in irregular activities. For the residents

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now