View Static Version

Cyber Security A Career Exploration Activity

#SBCareerReady #SBC_ICT

“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” – Stephane Nappo

What is Cybersecurity?

Cybersecurity refers to the practice of ensuring the integrity, confidentiality, and availability (ICA) of information. Cybersecurity is comprised of an evolving set of tools, risk management approaches, technologies, training, and best practices designed to protect networks, devices, programs, and data from attacks or unauthorized access.

“You are an essential ingredient in our ongoing effort to reduce Security Risk.” ― Kirsten Manthorne

Why is Cybersecurity Important?

Society relies on technology more than ever before. This reliance has increased the amount of digital information that is moved and stored and because of this it is imperative that this information be kept safe at all times.

If a person, company, organization, or government is hacked the consequences can be devastating. For example, an individual can become a victim of identity theft causing financial ruin, emotional distress, loss of time, lower credit score, and possible arrest. The consequences are similar for companies, governments, and organizations on a larger scale. In addition, these entities are responsible for their data as well as the data of any one who does business with them.

Common Cyber Threats

Malware

Malicious software designed to crash a computer.

  • Viruses
  • Worms
  • Trojan horses
  • Ransomware

Phishing

Emails crafted to look as though they are authentic and to trick the recipient into sharing personal information.

Pen-testing

The use of hacker tools to identify weaknesses that can be penetrated. Pen-testing can be done ethically and unethically.

Bot/Botnet

Software that performs tasks on command from a remote hacker allowing them to take control of a computer(s).

Clickjacking

An attack that tricks a victim into unintentionally clicking a link or button that has been disguised as harmless.

Too Err is Human

Many cybersecurity threats arise from human error. Click the link below to identify security violations that may lead to a cybersecurity issue. You have 2 minutes to find all 5 violations

5 Types of Cybersecurity

Critical Infrastructure Security

Examples would be water companies, traffic lights, shopping centers, hospitals, electricity grid.

Application Security

Software and hardware used to minimize external threats. Types of application security are antivirus programs, firewalls, and encryption programs.

Network Security

Secures internal networks by protecting the network infrastructure and preventing unauthorized access to it. Examples of network security are extra logins, new passwords, and implementation of applications.

Cloud Security

Software-based security tool that protects and monitors data stored in the cloud.

Internet of Things (IoT) Security

Critical and non-critical cyber physical systems such as appliances, sensors, WiFi routers, and more.

3 Careers in Cybersecurity

Watch the three videos below and take notes on key points of interest for each career.

Information Security Analyst

Pen Tester and Ethical Hacker

Security Engineer

Want to know more about one or more of these careers? Research them at the link below.

Reflection

  1. What new information did you learn about cybersecurity or cyberysecurity careers by completing this activity?
  2. Would you consider a career in cybersecurity? Why or why not?
  3. What classes would help prepare you for a career in cybersecurity?
  4. How can keeping current with cybersecurity issues help protector you and your employer?
  5. Write down one thing you would have liked to learn about cybersercurity but didn't and independently research the topic.

Explore your next step...

Click the link below to explore high school pathways and community college programs in Information and Communication Technologies throughout the Inland Empire.

Credits:

Created with images by Unknown - "President Donald Trump’s Cybersecurity Executive Order" • Markus Spiske - "Code on computer monitor" • Ali Yahya - "untitled image" • Michael Geiger - "Laptop displaying a pirate flag / jolly roger on a red screen, possibly indicating malware, hackers or a different computer problem." • Unknown - "Closeup of programming code and language | Free stock ..." • bert sz - "untitled image" • Alex Kotliarskyi - "Programming " • Unknown - "News | OpenStand" • Charis Gegelman - "untitled image" • Gift Habeshaw - "new graduate student "

NextPrevious