IJISC
  • Indexed in

  • Latest News

    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Information Security Analyst Profile


    Author(s): BARBU, Ionuț-Daniel; PASCARIU, Cristian

    Quick view | Full article | Citations | Views: 1,996


    Author(s) keywords: , , , , , , , , , , , , , , , , , , , , , , , ,


    Reference keywords: ,


    Abstract:

    Internet of Things is a concept dating back to 1991 and it refers, in fact to a scenario where everything is connected to the Internet. The idea of having everything interconnected and moreover, connected to the internet becomes more and more usual nowadays and futurologists start to be extremely realistic when admitting that from the car to house appliances, body characteristics such as temperature to pet automatic feeding machine, everything will be connected to World Wide Web. In this world a critical aspect emerges, that of information security. We are starting to be more and more reluctant to providing information which relates to us but what if that is taken without our knowledge and what if we are a large enterprise with valuable intellectual property. This is one of the main reasons why in the Information Security field the demand for jobs is growing extremely rapidly. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. This article details the Information Security related jobs, thoroughly studying the InfoSec analyst role. Moreover it highlights the critical importance of training and certification programs.



    References:

    [1]. S. Harris, CISSP Boxed Set, Second Edition (All-in-One), 2004

    [2]. M. Walker, CEH Certified Ethical Hacker Boxed Set, 2005

    [3]. E. Cole, SANS GIAC Certification: Security Essentials Toolkit (GSEC), 2010

    [4]. P. Gregory, CISA Certified Information Systems Auditor All-in-One Exam Guide, 2nd Edition, 2008

    [5]. M. Ciampa, Security+ Guide to Network Security Fundamentals, 2002

    [6]. D. Landoll, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition, 2003

    [7]. Security Analysis, (2014, Feb. 12). [Online] Available: http://www.infosecinstitute.com/jobs/security-analyst.html

    [8]. Information Security (2014, Feb. 15). [Online] Available: http://www.franklin.edu/information-security-bachelors-degree-program

    [9]. Security Certification (2014, Feb. 10). [Online] Available:  http://www.sourcefire.com/services/certification

    [10]. Security Certification (2014, Mar. 08). [Online] Available:  http://www.isaca.org/CERTIFICATION/Pages/default.aspx

    [11]. Security Certification (2014, Jan. 22). [Online] Available: http://www.tomsitpro.com/articles/information-security-certifications-205.html

    [12]. Information Security Certification (2014, Jan. 27). [Online] Available: http://www.offensive-security.com/information-security-certifications/

    [13]. ISO 27001 (2014, Feb. 11). [Online] Available: http://www.iso.org/iso/home/standards/management-standards/iso27001.htm

    [14]. IT Security Certification (2014, Mar. 14). [Online] Available: http://greenwireit.com/blog/2013/03/20/complete-list-it-security-certifications/



    Additional Information

    Article Title: Information Security Analyst Profile
    Author(s): BARBU, Ionuț-Daniel; PASCARIU, Cristian
    Date of Publication: 2014-06-28
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2014.01.03
    Issue: Volume 3, Issue 1, Year 2014
    Section: Advances in Information Security Research
    Page Range: 29-36 (8 pages)



    Copyright ©2012-2024
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.