Project2: Finding Trends in Your Profession Lewis 1 The Leading Trends in Cyber Security and Solving the Problem Shenavia Lewis CBR 600 9045...

Project2: Finding Trends in Your Profession Lewis9


The Leading Trends in Cyber Security and Solving the Problem

Shenavia Lewis

CBR 600 9045 Communicating, Problem Solving, and Leading in Cybersecurity

December 7, 2016

Abstract

The major cause of the trend in cyber security are because of career advancement, salary and the need to predict how future information exchange. Today, cybercrimes are rampant that it calls for the need of more cyber security professionals. Many companies have spent millions trying to fix security breaches in their organizations. In 2008, the pay range for an IT professional was about $90000 to $100000 per year, however from 2015 the surveys show that these professionals earned more than $200000 per year those in managerial position. this is due to education, experience and certifications that one can get (Corbin, 2013).

This is a steady improvement in the cyber security proffessio9nal career, and because it is continuously evolving, one must keep updated to the new inventions. One must make sure that he is well informed and aware on the recent security breaches and latest security control measures.









EMERGING TRENDS IN CYBER SECURITY.

Cyber Attack Detection

https://www.researchgate.net/publication/272362198_Effects_of_cyber_security_knowledge_on_attack_detection

This is the knowledge of network operations and information security that enables on to detect an unauthorized access in a network. An Intrusion Detection System was made to identify any malicious occurrences and reveal an attack that is due to network activity sequence. The results show that the advanced knowledge in cyber security helped in detection of unauthorized access.

Even the through cyber security awareness helps in identifying any malicious events, knowledge about specific network is required to make important decisions. The difference in the feedback between the cyber security experts and the non-professional is that, the experts could tell the type of cyber-attack whereas the non-experts were not aware to the attacks. Because of these findings, it was brought into attention on the importance of improving cyber security.

Investment Outlook

http://www.researchandmarkets.com/research/m4f6wf/cyber_security

This is a report that analyzes the global cyber security environment, cyber-attack sources, how to counter cyber-attacks and the investment planned on the cyber security products and services for the next two years. It also examined the opinions on the potential impacts of cyber-attacks to the organizations barriers to cyber security, potential market to the cyber security products and anticipation of cyber security products to the next two years were also the key points it discussed.

The findings of the report were that, the executives expected cyber-attacks to result in security lapses, data leakage and miscommunication in the organization. Email propagation of malicious code was the frequent technique used by cyber attackers. The executive stated that the most cyber threats originate from china. Organizations should conduct a periodic review of the system and administrative logs and adopt security policies to counter the cyber-attacks for the two years. The executives expected that less than US$50 million of investments to the cyber security for the next two years.

Career Advancement Opportunities for Cyber Security Professionals https://missioncriticalinstitute.org/cybersecurity-professionals/

Because of the cyber security staffing shortages, there is need for the public and private sectors employers to enable qualified cyber security professional to advance rapidly. A national Intelligence estimate says that cyber threats are number one for the US national security challenge. Cyber-attacks, security breaches, compliance challenges and new technologies (like BYOD, social media, mobile security, and cloud security) keep fueling the demand for the qualified cyber security professionals. Therefore, the skilled experts, especially those who hold a security clearance and DOD- 8570 compliant certification, the opportunities for career advancement are unique.

This unique programs includes; Veterans Cyber Security Career Advancement Program (VCCAP) and Cyber Security Career Advancement Program (CCAP). These programs ensure that the cyber security experts get a ready job and continue to advance in their career which will enable them to advance to a more highly compensated position.

The Myths and Facts behind Cyber Security Risks for Industrial Control Systems.

http://3to1z93m5aspz1tlzcsjta2m.wpengine.netdna-cdn.com/keckjw/wp-content/uploads/sites/2169/2014/11/Myths-and-Facts-for-Control-System-Cyber-security.pdf

This helps in predicting the future of the cyber security and how the information could be exchanged. The British Columbia Institute of Technology (BCIT) can maintain a cyber security incidence data base and track the occurrences of cyber security that can affect the control processes and systems. This includes accidental cyber related and deliberate events like external hacks and virus or worm’s infiltration.

These incidences were divided between internal and external sources, and accidental incidence was only 33% of all the incidences that were being generated outside the organization. Unauthorized employee’s activities, accidental and dissatisfied ones were to blame to most of the problems. This information could be used to determine the steps needed to handle security breaches and information could be exchanged in a safer way.

Cyber security Pros in High Demand, Highly Paid and Highly Selective.

http://www.cio.com/article/2383451/careers-staffing/cybersecurity-pros-in-high-demand--highly-paid-and-highly-selective.html

Experts in cyber security are among the most professionals in demand in the tech sector, with demand for workers in that field surpassing other IT jobs by a wide margin. A new survey by Semper Secure, a public-private partnership in Virginia formed to tackle the cyber security profession, offers a fresh glimpse at what security workers earn, what they look for in an employer and where the hubs of innovation are located. The survey reported that Cybersecurity professionals earn an average salary of $116,000, or approximately $55.77 per hour. That's nearly three times the national median income for full-time wage and salary workers, according to the Bureau of Labor Statistics.

"For top talent, cyber security isn't about just a job and a paycheck, It is about the hottest technology, deployed by honorable organizations, for a purpose that is inherently important." says Jim Duffey, secretary of technology at the office of the governor of Virginia.

US Policies on the Cyber security.

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2548561

In December, 2014 the US congress passed five major proposals that were designed to enhance the US cyber security. The president signed the proposal into law and it became the first cyber security law to be enacted since the passage of Federal Information Security Management Act of 2002. In reference to the Ebola pandemic, policy challenges were illustrated in order to help transform technological; language of cyber security to be understood easily.

Just like Ebola, the cyber security attack is able to bring the nation to a standstill. The cyber security policies are similar to those of Ebola, the characteristics of selected competing cyber security constituent groups are discussed: consumers; investors; law enforcement; business; federal, state and local government; and national security interests. By exploring the perceived needs and sometimes conflicting actions of these various constituencies.


References

Ben-Asher N., & Gonzalez C. (2015). Effects of Cyber Security Knowledge on attack Detection in Computers in Human Behavior 48: 51-61. Retrieved on December 7, 2016 from https://www.researchgate.net/publication/272362198_Effects_of_cyber_security_knowledge_on_attack_detection

Byres E.J., & Lowe J. (2004). “The Myths and Facts behind Cyber Security Risks for Industrial Control Systems.” VDE 2004 Congress, VDE, Berlin. Retrieved on December 7, 2016 from http://3to1z93m5aspz1tlzcsjta2m.wpengine.netdna-cdn.com/keckjw/wp-content/uploads/sites/2169/2014/11/Myths-and-Facts-for-Control-System-Cyber-security.pdf

Career Advancement Opportunities for Cybersecurity Professionals (2013) (ISC) Global Information Security Workforce Study. Retrieved on December 7, 2016 from https://missioncriticalinstitute.org/cybersecurity-professionals/

Corbin, Kenneth (2013). Cybersecurity Pros in High Demand, Highly Paid and Highly Selective. Retrieved on December 7, 2016 from http://www.cio.com/article/2383451/careers-staffing/cybersecurity-pros-in-high-demand--highly-paid-and-highly-selective.html

Cyber Security-Emerging Trends and Investment Outlook (2014). In Strategic Defense Intelligence. Retrieved on December 7, 2016 from http://www.researchandmarkets.com/research/m4f6wf/cyber_security

Trautman, Lawrence J. Cybersecurity: What about U.S Policy? (2015). Journal of Law, Technology and Policy, Vol 341. Retrieved on December 7, 2016 from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2548561