Page 5 - My FlipBook
P. 5

a lot of money for data security analysts (DSAs) who can stop the
               attacks and secure vital information.
                   DSAs guard against cyberattacks, hacking, phishing opera-
               tions that seek out private data, and so-called greenmail, which
               is a variant of blackmail in which a hacker steals confi dential busi-
               ness info and demands money for keeping it secret. A securi-
               ty analyst must fi nd vulnerable points where an outsider might
               breach a system with a stolen password, a phishing e-mail, or
               a malware program installed remotely or on-site. Any company
               that communicates information over the Internet or other data
               networks is a target—and needs its data protected.
                   A DSA knows how protective computer fi rewalls work and un-
               derstands encryption technology, which is the science of hiding
               data by rendering it into alphanumeric codes to which only key
               holders have access. Security analysts perform regular security
               audits, train employees and users in security procedures, set up
               policies, and manage passwords and access levels. To break into
               the fi eld, analysts “need to decide what to specialize in,” reports
               Roger  Grimes  in  a  CSO  Online  Security  Adviser  column.  “The
               computer security fi eld is huge and covers dozens of disciplines
               including fi rewalls, IDS [intrusion detection system], SIEM [secu-
               rity information and event management], security assessment,
               host hardening, and patching.” These systems and techniques
               provide data networks with a protective layer to guard against
               cyberattacks.
                   DSAs who work in security operations centers (SOCs) spend
               their days in front of computer monitors or wall screens in large
               control rooms, directing traffi c through a network and dealing with
               a constant stream of threats. “We never know what is going to
               happen,” comments Jim Treinen, a security analyst for Protect-
               Wise, a network security fi rm. “A day can start out calm or start
               out on fi re and very quickly go from one or another.”
                   On arrival, the prior shift updates the DSA on the system’s
               status and any incidents that may have occurred. Tough deci-
               sions must be made; it is not a job for robots or software alone.




                                                9
   1   2   3   4   5   6   7   8   9   10