Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Security Consultant/Specialist/Intelligence=== : Broad titles that encompass any one or all of the other roles or titles tasked with protecting computers, networks, software, data or information systems against viruses, worms, spyware, malware, intrusion detection, unauthorized access, denial-of-service attacks, and an ever-increasing list of attacks by hackers acting as individuals or as part of organized crime or foreign governments. <!-- PLEASE RESPECT ALPHABETICAL ORDER --> Student programs are also available for people interested in beginning a career in cybersecurity.<ref>{{cite web|title=Student Cybersecurity Resources|url=https://niccs.cisa.gov/formal-education/students-launch-your-cyber-career|url-status=live|archive-url=https://web.archive.org/web/20201105234726/https://niccs.cisa.gov/formal-education/students-launch-your-cyber-career |archive-date=5 November 2020 |publisher=NICCS (US National Initiative for Cybercareers and Studies)}}</ref><ref>{{cite web |url=https://www.dhs.gov/join-dhs-cybersecurity |title=Current Job Opportunities at DHS |publisher=U.S. Department of Homeland Security |access-date=5 May 2013 |url-status=live |archive-url=https://web.archive.org/web/20130502135412/http://www.dhs.gov/join-dhs-cybersecurity |archive-date=2 May 2013 }}</ref> Meanwhile, a flexible and effective option for information security professionals of all experience levels to keep studying is online security training, including webcasts.<ref>{{cite web |url=https://www.dhs.gov/cybersecurity-training-exercises |title=Cybersecurity Training & Exercises |publisher=U.S. Department of Homeland Security |access-date=9 January 2015 |url-status=live |archive-url=https://web.archive.org/web/20150107111146/http://www.dhs.gov/cybersecurity-training-exercises |archive-date=7 January 2015 |date=12 May 2010 }}</ref><ref>{{cite web |title=Cyber Security Awareness Free Training and Webcasts |url=https://msisac.cisecurity.org/resources/videos/free-training.cfm |publisher=MS-ISAC (Multi-State Information Sharing & Analysis Center) |access-date=9 January 2015 |url-status=live |archive-url=https://web.archive.org/web/20150106064140/http://msisac.cisecurity.org/resources/videos/free-training.cfm |archive-date=6 January 2015 }}</ref> A wide range of certified courses are also available.<ref>{{cite web|url=http://iase.disa.mil/iawip/Pages/iabaseline.aspx|title=DoD Approved 8570 Baseline Certifications|website=iase.disa.mil|archive-url=https://web.archive.org/web/20161021073353/http://iase.disa.mil/iawip/Pages/iabaseline.aspx|archive-date=21 October 2016|access-date=19 June 2017}}</ref> In the United Kingdom, a nationwide set of cybersecurity forums, known as the [[UK Cyber Security Forum|U.K Cyber Security Forum]], were established supported by the Government's cybersecurity strategy<ref>{{cite web |url=https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/386093/The_UK_Cyber_Security_Strategy_Report_on_Progress_and_Forward_Plans_-_De___.pdf |title=The UK Cyber Security Strategy: Report on Progress and Forward Plans December 2014 |publisher=United Kingdom Cabinet Office |access-date=20 August 2021 |url-status=live|archive-url=https://web.archive.org/web/20180418230804/https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/386093/The_UK_Cyber_Security_Strategy_Report_on_Progress_and_Forward_Plans_-_De___.pdf |archive-date=18 April 2018 }}</ref> in order to encourage start-ups and innovation and to address the skills gap<ref>{{Cite web|url=https://www.gov.uk/government/news/cyber-skills-for-a-vibrant-and-secure-uk|title=Cyber skills for a vibrant and secure UK|website=GOV.UK}}</ref> identified by the [[Government of the United Kingdom|U.K Government]]. In Singapore, the [[Cyber Security Agency (Singapore)|Cyber Security Agency]] has issued a Singapore Operational Technology (OT) Cybersecurity Competency Framework (OTCCF). The framework defines emerging cybersecurity roles in Operational Technology. The OTCCF was endorsed by the [[Infocomm Media Development Authority]] (IMDA). It outlines the different OT cybersecurity job positions as well as the technical skills and core competencies necessary. It also depicts the many career paths available, including vertical and lateral advancement opportunities.<ref>{{cite press release | title=Singapore Operational Technology (OT) Cybersecurity Competency Framework | website=Cyber Security Agency | date=2021-10-08 | url=https://www.csa.gov.sg/News/Press-Releases/singapore-operational-technology-cybersecurity-competency-framework | archive-url=https://web.archive.org/web/20211016185633/https://www.csa.gov.sg/News/Press-Releases/singapore-operational-technology-cybersecurity-competency-framework | archive-date=16 October 2021 | access-date=23 October 2021 }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)