Upload
henry-ronald-rice
View
213
Download
0
Tags:
Embed Size (px)
Citation preview
Computer Security Computer Security SpecialistSpecialist
e-booke-book
Created by The University of North Texas in
partnership with the Texas Education Agency
The growing demand for Computer Security The growing demand for Computer Security Specialists is due to greater computer use Specialists is due to greater computer use
and the need to protect computer and the need to protect computer information.information.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 2
Computer Security Specialists plan and Computer Security Specialists plan and implement security measures that protect implement security measures that protect
and prevent unauthorized use or destruction and prevent unauthorized use or destruction of computer information.of computer information.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 3
They monitor reports of computer viruses They monitor reports of computer viruses and decide when to update virus protection and decide when to update virus protection
systems.systems.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 4
They set up programs to detect hackers, They set up programs to detect hackers, and they take steps to prevent hackers from and they take steps to prevent hackers from
gaining access to a system. gaining access to a system.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 5
They encrypt data and erect firewalls to They encrypt data and erect firewalls to conceal confidential information as it is conceal confidential information as it is
being transmitted.being transmitted.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 6
They often provide technical support and They often provide technical support and assistance and educate users on computer assistance and educate users on computer
security measures.security measures.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 7
They monitor security breaches, respond to They monitor security breaches, respond to cyber attacks, and sometimes gather evidence cyber attacks, and sometimes gather evidence
to be used in prosecuting cyber crime.to be used in prosecuting cyber crime.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 8
Computer Security Specialists are hired by Computer Security Specialists are hired by corporations, banks, airlines, hospitals, corporations, banks, airlines, hospitals,
school systems, universities, and school systems, universities, and government agencies.government agencies.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 9
A bachelor’s degree in computer science or A bachelor’s degree in computer science or information systems and computer-related information systems and computer-related
experience is generally preferred by experience is generally preferred by employers.employers.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 10
Computer Security Specialists usually work Computer Security Specialists usually work 40 hours a week in nice offices, but they 40 hours a week in nice offices, but they
also have to be on call at all times in case of also have to be on call at all times in case of emergencies. emergencies.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 11
Computer Security Specialists are in great Computer Security Specialists are in great demand, and the average starting pay is demand, and the average starting pay is
about $65,000 per year.about $65,000 per year.
UNT in partnership with TEA, Copyright © 2008. All rights reserved. 12