preview

Suggested Annotative Bibliography Essay

Satisfactory Essays
Open Document

Suggested Annotative Bibliography Definition: A Information Security Analyst encrypts data transmissions and erects firewalls to conceal confidential information as it is being transmitted and keeps out tainted digital transfers. He/She also develops plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. (Occupational Handbook)
"Cyber Security Jobs: IT Security Analysts Offer Defense Against Cyber Attacks."U.S. News University Directory. Curtis Ross, 2012. Web. 20 Mar. 2016. http://www.usnewsuniversitydirectory.com/articles/information-security-analysts-offer-frontline-defe_12452.aspx#.Vu8IYPkrKUk This article brings us into a world of an Information Security Analyst. The analyst must stay ahead of the different methods of hacking and also …show more content…

It shows and makes us keep in mind that not only do you need to have experience within this field but you also have to have the correct skill set. The demand for these specialists is not what creates the opportunity to be one, it is you. ----------------------------------------------------------------

Adler, Mike. "What Is It Like to Be a Cisco Security Analyst?" Cisco Blog RSS. 16 Apr. 2012. Web. 20 Mar. 2016. http://blogs.cisco.com/security/what-is-it-like-to-be-a-cisco-security-analyst Different types of security threats can occuring on the job. Such as vulnerabilities that continue to grow and evolve in scale but also in complexity. Technology roles such as system/network administrators get exposed to a variety of technologies which benefits them in the security analyst work field. The vast cooperation between new members and senior members of the team allow improvements of each other's skills. New knowledge and practices come to be understood during the exchange of

Get Access