{"id":288,"date":"2023-11-27T04:03:49","date_gmt":"2023-11-27T04:03:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ravenhill\/?p=288"},"modified":"2023-11-27T04:03:49","modified_gmt":"2023-11-27T04:03:49","slug":"training-and-technology-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ravenhill\/2023\/11\/27\/training-and-technology-in-cybersecurity\/","title":{"rendered":"Training and Technology in Cybersecurity"},"content":{"rendered":"\n<p><em>BLUF<br><\/em>This paper describes the training and technology that is needed for Cybersecurity. For the<br>required knowledge for cybersecurity training and technology, we need to understand how<br>funding impacts these.<\/p>\n\n\n\n<p><br><strong>Cybersecurity Training<br><\/strong>To start a career in Cybersecurity, there are two ways: earn a bachelor&#8217;s degree or attend boot<br>camp. To have a career in Cybersecurity, you are not limited to a Cybersecurity degree, it is<br>possible to start in this field with a bachelor&#8217;s degree in Computer Science or Information<br>Systems (Webb, 2023). However, with the number of breaches increasing, Cybersecurity officials<br>should implement training where employees can learn guidelines for conducting investigations<br>properly, up-to-date trends on the current exploits and\/or breaches, and any additional<br>information that would be beneficial for handling various cybercrimes (Collins, Sainato, &amp; Khey,<br>2011).<\/p>\n\n\n\n<p><br><strong>Cybersecurity Technology<br><\/strong>According to Surve (2023), there are five fundamental technological softwares that would be<br>beneficial for protecting our networks and data from any breaches and\/or hackers. These five<br>softwares include firewalls, an intrusion detection system, private networks, encryption, and<br>two-factor authentication (Surve, 2023). The five fundamental softwares is only the beginning<br>when it comes to the many softwares that are actually used in the field of Cybersecurity. Some of<br>these softwares include behavioral analytics, blockchain, extended detection and response<br>(XDR), and zero trust (Simmons, 2023).<\/p>\n\n\n\n<p><br><strong>Funding<br><\/strong>As technology continues to change and advance over the next few year, we are going to see<br>many changes in how technology is being used, what softwares can be used to make our lives<br>easier (e.g. using ChatGPU to write an entire paper for a class), and what training would<br>employees need to be informed about. With funding becoming an ever growing concern for<br>business, I believe that Cybersecurity officials and business need to create a balance on getting<br>employees the proper training and staying up-to-date on new technological advancements. On<br>the other hand, to stay informed on these advances, it would most likely take priority since these<br>softwares are needed to protect home and business networks from having data stolen by<br>hackers. However, with how technology is, you can not stay up-to-date on every network and<br>software issue. Most of the time, hackers are able to access personal data by people clicking and<br>viewing unauthorized websites or links that lead to a website asking for personal information.<\/p>\n\n\n\n<p><br><strong>Conclusion<\/strong><br>In conclusion, there is a lot of information that goes into being successful in the Cybersecurity<br>field. To acquire a job in Cybersecurity, you can either go to bootcamp or graduate with a<br>bachelor\u2019s degree. To protect a business from cybercrime, there needs to be five fundamental<br>softwares in place to protect data. If you work in the field of Cybersecurity, there are other<br>softwares needed to protect other networks and data. The training and technology can have an<br>impact on how to balance the funding. Training is helpful to succeed, but learning the softwares<br>needed to protect networks is a higher priority depending on the cost of these softwares.<br>Training would retrain and\/or remind employees of the basic guidelines.<br><\/p>\n\n\n\n<p><strong>References<br><\/strong>Collins, Jason D., Sainatio, Vincenzo A., &amp; Khey, David N. (2011). Organizational data breaches<br>2005-2010: Applying SCP to the healthcare and education sectors. International Journal<br>of Cyber Criminology, 5(1), 794-810.<br>Simmons, Liz (2023). New technologies in cybersecurity. Cyber Degrees.<br>https:\/\/www.cyberdegrees.org\/resources\/hot-technologies-cyber-security\/<br>Surve, Shashank (2023). 5 essential cyber security technologies every business must implement<br>to protect against potential threats. Linkedin.<br>https:\/\/www.linkedin.com\/pulse\/5-essential-cyber-security-technologies-every-business-sh<br>ashank-surve\/<br>Webb, Holland (2023). What degree do I need for a career in cybersecurity?. Cyber Degrees.<br>https:\/\/www.cyberdegrees.org\/resources\/degree-required-for-cybersecurity-career\/#:~:tex<br>t=Cybersecurity%20requirements%20include%20basic%20education,to%20emulate%20r<br>eal%2Dworld%20scenarios<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUFThis paper describes the training and technology that is needed for Cybersecurity. For therequired knowledge for cybersecurity training and technology, we need to understand howfunding impacts these. Cybersecurity TrainingTo start a career in Cybersecurity, there are two ways: earn a bachelor&#8217;s degree or attend bootcamp. To have a career in Cybersecurity, you are not limited&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ravenhill\/2023\/11\/27\/training-and-technology-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":27292,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ravenhill\/wp-json\/wp\/v2\/posts\/288"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ravenhill\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ravenhill\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ravenhill\/wp-json\/wp\/v2\/users\/27292"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ravenhill\/wp-json\/wp\/v2\/comments?post=288"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/ravenhill\/wp-json\/wp\/v2\/posts\/288\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/ravenhill\/wp-json\/wp\/v2\/posts\/288\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ravenhill\/wp-json\/wp\/v2\/media?parent=288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ravenhill\/wp-json\/wp\/v2\/categories?post=288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ravenhill\/wp-json\/wp\/v2\/tags?post=288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}