Cybersecurity Professionals and Their Tasks: Four (4) Cybersecurity Career Paths
Cybersecurity Professionals and Their Tasks: Four (4) Cybersecurity Career Paths
Cybersecurity Professionals and Their Tasks: Four (4) Cybersecurity Career Paths
Step 2: Attack
After getting access to the network, hackers proceed with infiltrating the organization’s network. But to access
the network freely, they need access privileges. Hence, attackers use rainbow tables and similar tools which
help them with stealing credentials to upgrade their access to administrator privileges.
Now, hackers can access the entire network and go through the networks silently. Then, attackers are free to
obtain sensitive information for selling on the Internet or encrypt the data to demand a ransom. Sometimes,
hackers alter or erase sensitive data for reasons beyond financial gain.
Step 3: Expansion
Hackers intrude all systems on the network using malicious programs. Malicious programs enable attackers to
hide in multiple systems in the organizations and regain access to the network even after being detected.
Additionally, hackers no longer require higher access to infiltrate the network.
Step 4: Obfuscation
Hackers proceed to hiding their tracks to mask the origins of the attack. Additionally, they safely place their
exploit in a system to avoid getting detected. The main purpose of obfuscation is confusing and disorienting
the forensic experts. For successful obfuscation, hackers use various tools and techniques such as spoofing,
log cleaning, zombie accounts, and Trojan commands. Cybersecurity experts generally consider obfuscation
as the final stage of the anatomy of a cyber attack.
establish a comprehensive approach to mitigate insider risks, including strong data governance,
communicating cybersecurity policies throughout the organization, and implementing effective access
and data-protection controls.
6. Regulatory – Increased regulation, laws, rules, and standards related to cyber are designed to protect
and insulate businesses and their customers. Regulation and compliance, however, cannot become the
sole focus. Firms must balance both new regulations and evolving cyber threats, which will require
vigilance on all sides.
7. Board of Directors – Cybersecurity oversight continues to be a point of emphasis for board directors
and officers, but recent history has seen an expanding personal risk raising the stakes. Boards must
continue to expand their focus and set a strong tone across the company, not only for actions taken
after a cyber-incident but also for proactive preparation and planning.
passwords, access control lists (ACLs), and encryption. It is also common for information to be categorized
according to the extent of damage that could be done should it fall into unintended hands. Security measures
can then be implemented accordingly.
Integrity ensures that the information is in a format that is true and correct to its original purposes. The
receiver of the information must have the information the creator intended him/her to have. Only the
authorized persons can edit the information. It will remain in its original state when at rest. Integrity is
implemented using security mechanisms such as data encryption and hashing. Note that the changes in data
might also occur as a result of non-human-caused events, such as electromagnetic pulse (EMP) or server crash.
It is important to have the backup procedure and redundant systems in place to ensure data integrity.
Availability ensures that information and resources are available to those who need them. It is implemented
using methods such as hardware maintenance, software patching, and network optimization. Processes such
as redundancy, failover, RAID, and high-availability clusters are used to mitigate serious consequences when
hardware issues do occur. Dedicated hardware devices can be used to guard against downtime and
unreachable data due to malicious actions like distributed denial-of-service (DDoS) attacks.
Data Classification Standards
This standard aims to establish a framework for classifying data based on its level of sensitivity, value, and
criticalness. Classification of data will aid in determining baseline security controls for the protection of data.
• Understanding – The cycle of managing data begins with understanding what the data is, how it has
been classified, and where it will be located. The information management life cycle is iterative and
will keep looping back in understanding data. For example, as data changes and becomes aggregated,
it may need to be reclassified.
• Creating – This includes, but is not limited to, collecting data, experimenting, observing, and
measuring and simulation.
• Storing – This includes, but is not limited to, designing research, locating existing data, and capturing
and creating metadata.
• Using – This includes, but is not limited to, entering data, digitizing, transcribing and translating,
checking, validating, filtering and cleaning data, anonymizing data where necessary, describing,
managing, interpreting, and deriving data, and statistical analysis.
• Sharing – This includes, but is not limited to, distributing, sharing, promoting data, controlling access,
establishing copyright, producing research outputs and author publications, preparing data for
preservation, and using the data classification definitions to help the user through this process.
• Archiving – This includes, but is not limited to, migrating data to the best format and suitable medium,
backing up and storing data, creating metadata and documentation, and archiving data.
• Destroying – This includes, but is not limited to, disposing of data, destroying paper records and
electronic media, and electronic shredding.
References:
Bashay, F. (2018, February 2). What is the CIA triangle and why is it important for cybersecurity management? [Web log post]. Retrieved from
https://www.difenda.com/blog/what-is-the-cia-triangle-and-why-is-it-important-for-cybersecurity-management on April 22, 2019
Destroying (n.d.). In Information Security. Retrieved from https://security.uwo.ca/information_governance/standards/data_handling_standards/destroying.html
Ethical hacker (n.d.). In TechTarget. Retrieved from https://searchsecurity.techtarget.com/definition/ethical-hacker on April 22, 2019
Fruhlinger, J. (2019, January 4). What is a CISO? Responsibilities and requirements for this vital leadership role [Web log post]. Retrieved from
https://www.csoonline.com/article/3332026/what-is-a-ciso-responsibilities-and-requirements-for-this-vital-leadership-role.html on April 22, 2019
Goolik, S. (2019, March 19). 2019’s cyber security vulnerabilities & best practices to protect your business [Web log post]. Retrieved from https://symmetrycorp.com/blog/8-
cyber-security-vulnerabilities/ on April 22, 2019
Joshi, N. (2018, December 22). The anatomy of a cyberattack: dissecting the science behind virtual crime [Web log post]. Retrieved from https://www.allerin.com/blog/the-
anatomy-of-a-cyber-attack-dissecting-the-science-behind-virtual-crime on April 22, 2019
New Horizons Computer Learning Centers (2018, July 19). 4 cybersecurity career paths (And the training to get you there) [Web log post]. Retrieved from
https://www.newhorizons.com/article/4-cybersecurity-career-paths-and-the-training-to-get-you-there on April 22, 2019
Security architect. (n.d.). Retrieved from https://www.infosecinstitute.com/career-profiles/security-architect/ on April 22, 2019
What does a security consultant do? (n.d.). In Neuvoo. Retrieved from https://neuvoo.ca/neuvooPedia/en/security-consultant/ on April 24, 2019
What is cybersecurity? (n.d.). In Cisco. Retrieved from https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html on April 22, 2019
What is a cyber security professional (n.d.). In Career School Now. Retrieved from https://careerschoolnow.org/careers/cyber-security on April 22, 2019