5. Information Security Experts
Hackers are no longer teenagers or twenty-something disaffected students seeking to make a name for themselves or gain the satisfaction of taking down a corporate website. Hackers have matured, creating businesses based on malicious software. Looking like legitimate software development firms, hackers in Eastern Europe create malicious software to steal credit card numbers from company databases, generate malware that infects someone’s computer before demanding a ransom, take down corporate websites for a fee and develop bot-nets of infected computers that are used for everything from hosting child porn for a fee to sending out spam from a hundred thousand computers so that it is more likely to get through. The information security field has likewise had to improve. Information security analysts plan multiple security measures from an organization above and beyond the standard firewall and antivirus software. They may implement intrusion detection software or real time network monitoring on corporate networks. They monitor IT networks and databases for attacks, plan the next round of security improvements and may test a network for vulnerabilities so that they can be patched before the gaps are found by the bad guys.
Discussion about this post