Running Head: COMPUTER MANAGEMENT SECURITY
Computer Management Security
Computer Applications CGS2167-XX
29 April 2010
A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.
Computer Security Manager
Computer security is made up of digital forensic, network security, and preventing malware, and is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the internet are the fastest growing technology used for criminal activity, the need for computer security managers will increase in years to come. A computer security manager examines computer media, programs, data, and log files on computers, servers, and networks. There are many business that employ computer security managers, including colleges, hospitals, law enforcement, the military, and many others organizations of the government and private sector. A computer security manager must have knowledge of the latest computer and network policies, patches, and have good technical experience with many types of hardware and software products, superior communication skills, and willingness to learn and update skills, and a knack for problem solving skills. When a problem occurs, it is the responsibility of the computer security manager to carefully take the required steps to identify and resolve the security issues....
Cited: Reinman, D. P. (2008, February). Fighting Cybercriminal. Cybertech Monthly , pp. 52-58.
Shelly, G. B. (2008, March 7). Computer Careers. Retrieved from scsite.com: http://www.scsite.com/wd2007/pr2/wc.html
Turrel, M. O. (2008). Cybercrimes and Criminals. El Paso: Legal Works Publishing Company.
Please join StudyMode to read the full document