Question

In: Computer Science

What network security specialist do to fight hackers? I need all the information and clear explanation

What network security specialist do to fight hackers? I need all the information and clear explanation

Solutions

Expert Solution

In a world where a Security Guard protects assets and a Bodyguardprotects people, a Cyber Security Specialist protects information from theft, illegal duplication, and unauthorized access. The work of a Cyber Security Specialist focuses on finding risks and possible leaks. Cyber Security Specialists deal with protecting information on computer networks, cloud servers, mobile devices, and payment software, to name a few. They analyze where these risks are and develop strategies to prevent breaches. Cyber Security Specialists fight against cyber criminals, people who use the internet and various hacking methods to steal sensitive or private information from computers.

Many of the job aspects of a Cyber Security Specialist overlap with those of someone working in the field of Information Technology due to the nature of their work being closely tied to computers and technology. Like most positions related to Security, Cyber Security Specialists rely heavily on teamwork due to the broad scope of the Computer Science field and the security measures that need to be applied to it.

Here’s a non-exhaustive list of common tasks Cyber Security Specialists are required to complete.

  • Understanding the information that needs to be protected:
  • Determining security measures best suited for the type of information; and
  • explaining the security measures taken to employers using non-technical language.
  • Protecting sensitive or personal information from unauthorized access or use:
  • Identifying potential security risks;
  • designing strategies and defensive systems against intruders;
  • monitoring systems for unusual activities (e.g. unauthorized access, modification, duplication, or destruction of information);
  • running counteractive protocols; and
  • reporting incidents.
  • Testing security strategies and defenses:
  • Attempting to break in to uncover potential weaknesses;
  • acting like a hacker to test defensive systems;
  • trying to access information without proper credentials;
  • trying to breakthrough firewalls and other security applications; and
  • writing reports based on test results.
  • Developing new defensive systems and protocols:
  • Creating new layers of protection;
  • updating security systems; and
  • developing new counteractive protocols.
  • Granting permission and privileges to authorized users.
  • Running diagnostics on information changes to check for undetected breaches that may have occurred.
  • Analyzing new methods of intrusion by cyber criminals:
  • Keeping up-to-date on trends and new procedures in the industry; and
  • taking the necessary precautions, updating and fortifying defenses accordingly.
  • Protecting information from unauthorized access, duplication, modification, or destruction.
  • Analyzing security measures taken to protect information.
  • Testing for and correcting possible weaknesses or openings.
  • Configuring security programs and tools.
  • Running vulnerability tests and updating defensive protocols and systems accordingly.
  • Granting access and credentials to authorized users.
  • Monitoring all access to the information.
  • Checking for unregistered changes of information.
  • Running defensive protocols and programs when breaches occur.
  • Writing regular reports on systems status.

Related Solutions

Please I need a clear explanation and clear handwriting with explanaing this for me because I...
Please I need a clear explanation and clear handwriting with explanaing this for me because I am realy confused and need help. Thanks in advance My lab was about  Magnets and Magnetic fields. This is the question I need to answer for! R3: Explain how a speaker works by explaining why each part is required. after that Summarize R3’s answer by explaining why the proffesor homemade earbud is so much superior to the one that you made.
Please, I need a correct answer and clear explanation. Thank you, Part I – Explanation Q1...
Please, I need a correct answer and clear explanation. Thank you, Part I – Explanation Q1 Below are pairs of changes that affect elements of the accounting equation. Give an example of a transaction or economic event that reflects each: a. Asset increases, asset decreases b. Asset increases, liability increases c. Asset increases, shareholders’ equity increases d. Asset increases, revenue increases e. Liability decreases, asset decreases f. Asset decreases, expense increases g. Liability decreases, revenue increases h. Asset decreases, shareholders’...
Please, I need a correct answer and clear explanation. Thanks! What are the advantages and disadvantages...
Please, I need a correct answer and clear explanation. Thanks! What are the advantages and disadvantages of using the accrual basis of accounting rather than the cash basis?
Please, I need correct answers and clear explanation. You have been provided with the following information...
Please, I need correct answers and clear explanation. You have been provided with the following information about Bibi’s inventory for January 2018. Bibi uses a period inventory system to sell her customized Swell water bottles. While the water bottles come in different colours, she only sells one size so all her units are homogenous. Number of units Cost per unit Total cost Price per unit sold Total revenue January 1–Beginning inventory 1,250 $25.00 $31,250 January 6–Purchase 750 $24.00 $18,000 January...
I need clear explanation on how we got that answers. Thanks. 1. What is the decimal...
I need clear explanation on how we got that answers. Thanks. 1. What is the decimal value for the 8 bit 2's complement number 0x36 arithmetic shift right by 3. --> Ans is 6 2. What is the decimal value for the 8 bit 2's complement number 0x36 rotated left by 3 --> Ans is -79
How can inflation affect exchange rates? I need a clear explanation with clear reasoning and examples.
How can inflation affect exchange rates? I need a clear explanation with clear reasoning and examples.
I need a clear explanation with illustration / instances  on the first Agile Principle that states "the...
I need a clear explanation with illustration / instances  on the first Agile Principle that states "the highest priority is to satisfy the customer through early and continuous delivery of valuable software”.
Analyzing network traffic and understanding packets is an important task for IT security professionals. Illegitimate hackers...
Analyzing network traffic and understanding packets is an important task for IT security professionals. Illegitimate hackers also use network traffic to steal information and/or to about an organization's network infrastructure. How can different methods of packet capture be useful and why might one be chosen over another? How can understanding of the OSI model inform a discussion of packet capture?
I need to know all this information about Streptococcus mutans (tooth decay) please. PLEASE BE CLEAR...
I need to know all this information about Streptococcus mutans (tooth decay) please. PLEASE BE CLEAR AND ABLE TO UNDERSTAND IT I WILL RATE. -Virulence (Describe ability to cause disease; how are host defense inhibited or evaded; how does microbe gain nutrition from host) -Epidemiology (Incidence, Prevalence, Person, Place, Time, Relative facts)
I am creating a system for a security design and need to choose controls for network...
I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT