Preview

Top Three Trends in your profession and associated industry Annotated Bibliography

Satisfactory Essays
Open Document
Open Document
1485 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Top Three Trends in your profession and associated industry Annotated Bibliography
Briana Berry
Week 4
February 16,2015

Top Three Trends in your profession and associated industry-Annotated Bibliography

The top three trends in the Cyber Security field are salary, career advancement, and the need for predictions of the future in how information is exchanged.

Cyber-crimes are becoming more popular and because of the many attacks that are happening much more frequently it has caused for a higher demand in cyber security professionals. Companies spend millions of dollars to correct security breaches within their organization. Back in 2008 the salary range for IT security professionals were in the $80,000 to $90,000 pay range per year, whereas in surveys from 2014 it shows these professionals earning $100,000 or more a year for manager positions. Of course this differs based on experience, education, and certifications that individuals obtain but research shows that the demand and salaries for cyber security professions are only increasing.

The advancement of careers for Cyber Security professionals are also on the uprising. Cyber Security is a constantly evolving career that you have to stay abreast on. As long as you are well informed and up to date on the latest security breaches and the latest security controls you have a cutting edge and can provide the latest updates to a company. With this cutting edge you have the opportunity to advance in this fast growing career field. After I have studied a great amount into the Cyber Security field I plan to take my career farther and get some certifications under my belt for career advancement.

Another trend in the Cyber Security is how you can predict the future in how information is received. With the enormous amount of security breaches that have taken place and are only increasing a new form of password security has to be in place. Passwords will no longer be able to protect accounts in 2015 and a new trend in adopting different approaches to authentication must be presented.

1.



References: Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51-61. Trautman, L. J. (2015). Cybersecurity: What About US Policy?. Available at SSRN 2548561. Career Advancement Opportunities for Cybersecurity Professionals. (2013, January 1). Retrieved January 1, 2015, from https://missioncriticalinstitute.org/cybersecurity-professionals/ This article supports my trend on career advancements

You May Also Find These Documents Helpful

  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Best Essays

    There is an exigent need for creative ideas leading to the next generation of cyber security capability. Existing approaches are simply not able to meet the demands of a global society growing in cyberspace on the current path. New business models are forcing greater interdependency between people, organisations and nation states in order to successfully manage cyber risk. Success will necessarily require an ability to anticipate, deter, detect, resist and tolerate attacks, understand and predict cyber risks, and respond and recover effectively at all levels, whether individual, enterprise, national or across international markets. In order to meet the demands of the future we will require new understanding, governance, regulation, partnerships, skills, and tools.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Good Essays

    [Us as] security professional need to be aware of common attack methods so that they can take proactive steps to prevent attacks [by recognizing] them when they occur and respond [to them] appropriately (James M. Stewart, p. 48).…

    • 1033 Words
    • 3 Pages
    Good Essays
  • Best Essays

    1. UMUC (2012).The Future of Cybersecurity Technology and Policy, CSEC 670 (Module 2). Document posted in University of Maryland University College CSEC 670 9042 online classroom, archived at: http://webtycho.umuc.edu…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    CSIA Renews Call for Congressional Action on Cyber Security . (2007, September 6). Retrieved October 9, 2007, from https://www.csialliance.org…

    • 302 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Incident Response Plan

    • 930 Words
    • 4 Pages

    In the age of rapidly evolving technology, it is important for all businesses, large or small, to have an incident response plan (IRP) set in place in the event of a cyber-attack. The idea of an IRP is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. Today, it is more of a question of when these cyber-attacks will occur rather than if they will occur. The IRP incorporates many fundamentals to help in these instances, such as, prevention, preparation, planning, incident management, recovery, mitigation, remediation, post incident analysis, and lessons learned. It is recommended that XYZ Retail Company implement the following guidelines to best prepare for a cyber-attack.…

    • 930 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Because organizations are overwhelmed by hackers and cyber-criminals, there are plenty of jobs in cybersecurity available for IT experts who know how to protect systems and prevent intrusions. Cybersecurity professionals may choose to work in the private sector or the public sector with an agency of The Department of Homeland Security (DHS).…

    • 530 Words
    • 3 Pages
    Good Essays
  • Good Essays

    4. CYBERSECURITY. Cyber threats have amplified with the globalization of digital communications, increased reliance on computer networks, and convergence of technology. Cyber threats have also evolved. The risk is no longer from sophisticated nation states, but also from hackers, criminals, and terrorists.…

    • 798 Words
    • 4 Pages
    Good Essays