Information Security Analyst Profile
Author(s): BARBU, Ionuț-Daniel; PASCARIU, Cristian
Author(s) keywords: BlueCoat, CCNA Security, CheckPoint, CISCO, CompTIA Security, confidentiality, data loss prevention, defense in depth, EC-Council, forensics, information security, integrity, International Information Systems Security Certification Consortium, ISACA, ISO 27000, monitoring, MTA Security, network security, Offensive Security, OSCP, penetration testing, qualys, Security Auditor, sourcefire, vulnerability assessment
Reference keywords: information security, network security
Abstract:
Internet of Things is a concept dating back to 1991 and it refers, in fact to a scenario where everything is connected to the Internet. The idea of having everything interconnected and moreover, connected to the internet becomes more and more usual nowadays and futurologists start to be extremely realistic when admitting that from the car to house appliances, body characteristics such as temperature to pet automatic feeding machine, everything will be connected to World Wide Web. In this world a critical aspect emerges, that of information security. We are starting to be more and more reluctant to providing information which relates to us but what if that is taken without our knowledge and what if we are a large enterprise with valuable intellectual property. This is one of the main reasons why in the Information Security field the demand for jobs is growing extremely rapidly. IT security specialists are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. This article details the Information Security related jobs, thoroughly studying the InfoSec analyst role. Moreover it highlights the critical importance of training and certification programs.
References:
[1]. S. Harris, CISSP Boxed Set, Second Edition (All-in-One), 2004
[2]. M. Walker, CEH Certified Ethical Hacker Boxed Set, 2005
[3]. E. Cole, SANS GIAC Certification: Security Essentials Toolkit (GSEC), 2010
[4]. P. Gregory, CISA Certified Information Systems Auditor All-in-One Exam Guide, 2nd Edition, 2008
[5]. M. Ciampa, Security+ Guide to Network Security Fundamentals, 2002
[6]. D. Landoll, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition, 2003
[7]. Security Analysis, (2014, Feb. 12). [Online] Available: http://www.infosecinstitute.com/jobs/security-analyst.html
[8]. Information Security (2014, Feb. 15). [Online] Available: http://www.franklin.edu/information-security-bachelors-degree-program
[9]. Security Certification (2014, Feb. 10). [Online] Available: http://www.sourcefire.com/services/certification
[10]. Security Certification (2014, Mar. 08). [Online] Available: http://www.isaca.org/CERTIFICATION/Pages/default.aspx
[11]. Security Certification (2014, Jan. 22). [Online] Available: http://www.tomsitpro.com/articles/information-security-certifications-205.html
[12]. Information Security Certification (2014, Jan. 27). [Online] Available: http://www.offensive-security.com/information-security-certifications/
[13]. ISO 27001 (2014, Feb. 11). [Online] Available: http://www.iso.org/iso/home/standards/management-standards/iso27001.htm
[14]. IT Security Certification (2014, Mar. 14). [Online] Available: http://greenwireit.com/blog/2013/03/20/complete-list-it-security-certifications/
Article Title: Information Security Analyst Profile
Author(s): BARBU, Ionuț-Daniel; PASCARIU, Cristian
Date of Publication: 2014-06-28
Publication: International Journal of Information Security and Cybercrime
ISSN: 2285-9225 e-ISSN: 2286-0096
Digital Object Identifier: 10.19107/IJISC.2014.01.03
Issue: Volume 3, Issue 1, Year 2014
Section: Advances in Information Security Research
Page Range: 29-36 (8 pages)
Copyright ©2012-2024
The International Journal of Information Security and Cybercrime (IJISC)
All rights reserved
The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.