12
Computer Security Computer Security Specialist Specialist e-book e-book Created by The University of North Texas in partnership with the Texas Education Agency

Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

Embed Size (px)

Citation preview

Page 1: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

Computer Security Computer Security SpecialistSpecialist

e-booke-book

Created by The University of North Texas in

partnership with the Texas Education Agency

Page 2: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

The growing demand for Computer Security The growing demand for Computer Security Specialists is due to greater computer use Specialists is due to greater computer use

and the need to protect computer and the need to protect computer information.information.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 2

Page 3: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

Computer Security Specialists plan and Computer Security Specialists plan and implement security measures that protect implement security measures that protect

and prevent unauthorized use or destruction and prevent unauthorized use or destruction of computer information.of computer information.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 3

Page 4: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

They monitor reports of computer viruses They monitor reports of computer viruses and decide when to update virus protection and decide when to update virus protection

systems.systems.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 4

Page 5: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

They set up programs to detect hackers, They set up programs to detect hackers, and they take steps to prevent hackers from and they take steps to prevent hackers from

gaining access to a system. gaining access to a system.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 5

Page 6: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

They encrypt data and erect firewalls to They encrypt data and erect firewalls to conceal confidential information as it is conceal confidential information as it is

being transmitted.being transmitted.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 6

Page 7: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

They often provide technical support and They often provide technical support and assistance and educate users on computer assistance and educate users on computer

security measures.security measures.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 7

Page 8: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

They monitor security breaches, respond to They monitor security breaches, respond to cyber attacks, and sometimes gather evidence cyber attacks, and sometimes gather evidence

to be used in prosecuting cyber crime.to be used in prosecuting cyber crime.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 8

Page 9: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

Computer Security Specialists are hired by Computer Security Specialists are hired by corporations, banks, airlines, hospitals, corporations, banks, airlines, hospitals,

school systems, universities, and school systems, universities, and government agencies.government agencies.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 9

Page 10: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

A bachelor’s degree in computer science or A bachelor’s degree in computer science or information systems and computer-related information systems and computer-related

experience is generally preferred by experience is generally preferred by employers.employers.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 10

Page 11: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

Computer Security Specialists usually work Computer Security Specialists usually work 40 hours a week in nice offices, but they 40 hours a week in nice offices, but they

also have to be on call at all times in case of also have to be on call at all times in case of emergencies. emergencies.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 11

Page 12: Computer Security Specialist e-book Created by The University of North Texas in partnership with the Texas Education Agency

Computer Security Specialists are in great Computer Security Specialists are in great demand, and the average starting pay is demand, and the average starting pay is

about $65,000 per year.about $65,000 per year.

UNT in partnership with TEA, Copyright © 2008. All rights reserved. 12