5 research sources that pertain to my major, & intended career:
1.
“Cybersecurity is a subset of information security (infosec). It refers to the practice of protecting programs, computer networks and digital information from malicious actors. ” (Forbes, 1)
Day-to-Day Responsibilities
“Professionals in the cybersecurity field must know how to counter cybersecurity threats like malware, ransomware and phishing. Some cyberattacks grab national headlines, but most cybersecurity work happens behind the scenes, protecting people and organizations who don’t know they’re under threat.” (Forbes, 1)
“Cybersecurity experts’ main job is to prevent attacks before they occur. Incident response is also a key part of their skill set, and these professionals must always be ready to take decisive action when a security breach happens.” (Forbes, 1)
What Makes a Good Cybersecurity Professional?
“Cybersecurity might be a good career for you if you are a detail-oriented, analytical person with a collaborative mindset and the ability to improvise. On the technical side of things, you’ll also need sharp math and computing skills. Most jobs in the field require at least a bachelor’s degree in cybersecurity or a related subject. ” (Forbes, 1)
Hamilton, Ilana. “Is a Cybersecurity Degree Right for You? Here’s What You Need to Know.” Forbes, Forbes Magazine, 30 Nov. 2022, https://www.forbes.com/advisor/education/cyber-security-degree/.
2.
“Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.” (Cisco, 1)
“What Is Cybersecurity?” Cisco, Cisco, 10 Oct. 2022, https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
3.
“Cyberspace and its underlying infrastructure are vulnerable to a wide range of risks stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services. Cyberspace is particularly difficult to secure due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkages between cyberspace and physical systems, and the difficulty of reducing vulnerabilities and consequences in complex cyber networks. Of growing concern is the cyber threat to critical infrastructure, which is increasingly subject to sophisticated cyber intrusions that pose new risks. As information technology becomes increasingly integrated with physical infrastructure operations, there is increased risk for wide scale or high-consequence events that could cause harm or disrupt services upon which our economy and the daily lives of millions of Americans depend. In light of the risk and potential consequences of cyber events, CISA strengthens the security and resilience of cyberspace, an important homeland security mission.” (Cisa, 1)
“Cybersecurity.” Cybersecurity and Infrastructure Security Agency CISA, https://www.cisa.gov/cybersecurity.
4.
“One of the many advantages to living in a world where every device is connected is convenience. It’s incredibly easy to conduct work, manage your social calendar, shop and make appointments from your smartphone or device. That’s why it’s become second nature to many of us.” (Comptia, 1)
“What Is Cybersecurity: Types and Threats Defined: Cybersecurity: Comptia.” Default, https://www.comptia.org/content/articles/what-is-cybersecurity.
5.
“IT security is the practice of protecting IT assets, such as endpoints, databases, servers, networks, and data from unauthorized access in order to prevent misuse or theft. It is an overarching process that is concerned with how enterprise data is handled on a day-to-day basis. These attacks may come from inside or outside an organization. Information security refers to protecting the confidentiality, integrity and availability of data by preventing unauthorized access, modification, manipulation, or destruction.” (Onelogin, 1)
“Cybersecurity is a “subset” of IT security. It deals with protecting assets from hacks or cyberattacks, i.e. threats originating from or via the Internet.” (Onelogin, 1)
“What Is Cybersecurity & Why Do We Need It.” OneLogin, https://www.onelogin.com/learn/what-is-cyber-security#:~:text=Cybersecurity%20is%20a%20set%20of%20processes%2C%20tools%20and,in%20corporate%20espionage%2C%20or%20extort%20money%20from%20victims.