OPINION: CYBERSECURITY IS THE MOST IMPORTANT OCCUPATIONS IN THE MODERN WORLD

Introduction

              (4) As time goes on, the world gets more and more advanced, everyone on this planet uses a certain type of technology in their household, workplace, city, town, neighborhood and many more. Using this modern technology means that it constantly needs protection and security because not everyone uses this technology for good. In my opinion, cybersecurity is the most important occupation. Not only does this job protect our modern technology, it also has a wide range of job opportunities, it helps companies be more efficient and also keeps us on our toes to defend against technological threats. 

Cyber Security jobs

             (4)  According to Cyber Magazine there will be over 3.5 million unfilled Cybersecurity jobs by 2021. Steve Morgan, the author of this article wrote that it’s going to be enough to fill 50 NFL stadiums, according to Cybersecurity Ventures. Cybersecurity is a very broad field and as the world moves forward technology also moves with it. Therefore, as these bodies of technology grow, we are going to need designs, practices and processes to protect programs, devices, networks and also data from harmful or malicious attacks. This creates many jobs and opportunities for anyone who is interested in this field, from students, teachers, IT workers and even parents. In Addition, there are so many job titles in Cybersecurity, some of them being: 

1. Application Security Administrator – Keep software / apps safe and secure.

2. Artificial Intelligence Security Specialist – Use AI to combat cybercrime.

3. Automotive Security Engineer – Protect cars from cyber intrusions.

4. Blockchain Developer / Engineer – Code the future of secure transactions.

5. Blue Team Member – Design defensive measures / harden operating systems.

6. Bug Bounty Hunter – Freelance hackers find defects and exploits in code.

7. Cybersecurity Scrum Master – Watch over and protect all data.

8. Chief Information Security Officer (CISO) – Head honcho of cybersecurity.

9. Chief Security Officer (CSO) – Head up all physical/info/cyber security.

10. Cloud Security Architect – Secure apps and data in the cloud.

11. Counterespionage analyst – Thwart cyber spies from hostile nation states.

12. Cryptanalyst – Decipher coded messages without a cryptographic key.

13. Cryptographer – Develop systems to encrypt sensitive information.

14. Cyber Insurance Policy Specialist – Consult on cyber risk and liability protection.

15. Cyber Intelligence Specialist – Analyze cyber threats and defend against them.

16. Cyber Operations Specialist – Conduct offensive cyberspace operations.

17. Cybercrime Investigator – Solve crimes conducted in cyberspace.

18. Cybersecurity Hardware Engineer – Develop security for computer hardware.

19. Cybersecurity Lawyer – Attorney focused on info/cyber security and cybercrime.

20. Cybersecurity Software Developer / Engineer – Bake security into applications.

These are some of the unique job titles in one of the fastest growing industries of Cybersecurity according to Cyber Magazine. 

The ways cyber security protects helps companies stay efficient                                            (3)           As we move forward in the modern world, there are so many vulnerabilities and threats  that affect our critical infrastructure. According to the Department of Multimedia Engineering, critical infrastructure is a term used to describe infrastructure, systems and assets that are essential for the society and the economy. Furthermore, their infrastructure and assets sometimes have some vulnerabilities and threats. Some of their vulnerabilities have to deal with energy, transportation, public health and health care, lack of encryption, default configuration, chemical and hazardous material, policies and procedures and many more. In addition, the threats can be put under 3 groups, natural threats, human caused threats and accidental or technical threats.

            (4) The natural threats can be weather problems, earthquakes, tsunamis, volcanic eruptions and more. Next is the human caused threats, which can be cyber attacks, rioting product tampering, bombings and more. SCADA, Supervisory Control And Data Acquisition system plays a big role  in observing, monitoring and controlling the whole cycle of business processes and data. It helps in the prevention of vulnerabilities and threats to Critical infrastructure.    According to the article SCADA Systems, “Nearly all the control actions are automatically performed by the remote terminal units (RTUs) or by the programmable logic controllers (PLCs).” SCADA is very significant for industrial organizations because they help maintain efficiency, communicate systems issues to help mitigate downtime and also process data for smarter decisions.

              (4)Furthermore, the system is made to notify the operator if the product is showing any errors, the operator then stops the system and tries to find the cause of the problem. They are able to view this information through an HMI, this shows the operator whatever he/she needs to know to solve the problem and try to prevent it from happening again. Many companies and organizations use SCADA, they are arguably the most significant systems in modern industries. Some of these industries that use SCADA have to deal with energy, manufacturing, oil and gas, power, recycling, water, waste water, transportation food and many more. 

How cybersecurity keeps us on our toes to defend against technological threats.

              (4)As a company, cyber security should play a big role in the success of the company, that means they have to always stay on their toes to defend against technological threats.  This being the case, how can company’s approach the development of cyber-policy and infrastructure given the short arm of predictive knowledge. They should approach the development of cyber-policy and infrastructure given the “short arm” of predictive knowledge by updating policies and infrastructure, by always being informed about the industry standards and by knowledge and adaptable. It is very significant to be up to date with cyber-policies and infrastructure because technology grows and changes by the minute. In addition, technology is something that humans have grown to be dependent on, it is part of our daily lives. This being the case, the policies and infrastructure have to be highly adaptable to keep important data safe. Furthermore, staying updated also means having ethics and human conditions in mind. They need to cater to different ethical views and motives in order to protect against immoral actions. Otherwise, it might lead to new loopholes which can get important data to be leaked. As an organization, you have to be always prepared for things unforeseen, as society goes on technology also advances, so you have to always davance with it. It is very important to always learn more or be educated in order to create policies and infrastructure that will stay up to date with the fast movement of humanity. 

Conclusion 

             (4) In conclusion, with the advancement of technology in the world right now, I think cybersecurity is the most important job to have. One may argue in opposition to this statement, but without cybersecurity our systems will constantly be vulnerable. The average human can have a cybersecurity job because it has a wide range of opportunities, anyone with the right amount of education can have a well paying job in this occupation. In addition, it helps companies be more efficient, for example companies that have to deal with concrete, electricity, manufacturing, factories, water, food and many more. Furthermore, it helps us stay up to date with threats and help to defend against them, so it is and will continue to be the one most important occupation in the world. 

References

Steve Morgan, Northport, N.Y, April 18, (2020): 50 cybersecurity titles that every job seeker should know about.

Rosalin John Robles, (2020), International Journalist of control automation: Common threats and vulnerabilities of critical infrastructures.

http://article.nadiapub.com/IJCA/vol1_no1/3.pdf

Check Point software technologies LTD, June(2020): Top 10 cybersecurity vulnerabilities and threats for critical infrastructure and SCADA/ICS.

https://www.checkpoint.com/downloads/products/top-10-cybersecurity-vulnerabilities-threat-for-critical-infrastructure-scada-ics.pdf

Pierluigi Paganini, July 15, (2020), resource.infosec institute: SCADA & security of critical infrastructures

https://resources.infosecinstitute.com/topic/scada-security-of-critical-infrastructures/

Leave a Reply

Your email address will not be published. Required fields are marked *