Documente Academic
Documente Profesional
Documente Cultură
Internet Resource
Guide
By Erick Cerrada
February 6, 2017
Table of Contents
Preface .....
......
a. Contents and Scope...
.. 3
b. Audience and Purpose....
.. 3
c. Assumptions:.....
.. 3
d. Organization..
.. 3
e. Tips for Guide Use..
.. 4
Periodicals/Journals...
..
a. Security Risk Analysis Management.
.5 b. Cyber Security: Big Data..
........ 6
Governmental Resources....
...
a. The Catalog of U.S. Government
Publications..... 7
b. The Statistical Abstract of the United
States.9
Homeland Security
.
a. Cyber Security Jobs...
.10
b. Office of Intelligence and
Analysis.. 11
Penn State Resources.
..
a. Information and Cyber Security (ICS)
12
b. Intelligence Analysis and Modeling (IAM)...
.. 13
2
Preface
This guide was created for the use of freshman Penn State
college students in the college of Information Sciences and Technology
(IST) who intend to pursue a major Security and Risk Analysis but do
not know what option to pick from. In this guide you will find resources
relating to these options to better prepare you and help you make the
right decision.
Assumptions:
3
however is not true because from the links provided, you are able to
explore and find many more careers using the same websites. These
links are specific to the purpose of this guide but are not the only way
they are useful.
Organization:
4
Security Risk Analysis Management
Web link:
http://journal.ahima.org/2011/02/28/security-risk-analysis-updated-
brief-available/
Abstract:
5
that include paper records as well as electronic ones. In this journal,
AHIMA mentions how critical Security and Risk Analysis is to their
infrastructure. As time has progressed, organizations such as this one
have been required to conduct or review a security risk analysis. The
company has released an updated practice brief that provides step-by-
step guidance as to how to perform a risk analysis. This was
established to ensure that there were no breaches to patients
information as we move into a more technological future. This shows
how Security and Risk Analysis majors are the future of technology.
AHIMA is an example of how various organizations are being required
to consider such risks for the success of their organizations.
Tips:
If you click on the authors name at the top, it will take you to her
different journal entries establishing more credibility on the
subject.
Web link:
https://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa.gov/20150018054.pdf
Abstract:
6
The National Aeronautics and Space Administration (NASA) provides an
overview of why Cyber Security is important in their organization
through the means of Big Data. Big Data has been a problem in cyber
security because the Data Computation Centers are being in constant
attack due to the fact that they are Internet accessible. Internet traffic
is going in and out creating huge amounts of data that are vulnerable
to any attack. This is where cyber security becomes effective. The goal
of cyber security is to identify verify that the users getting access to
the Data Computation Center are legitimate and are only obtaining the
data in which they are allowed to obtain. Within NASA, cyber security
finds attacks and stops them from becoming bigger threats. Its job is to
allow authorized users into the Data Computation Center while keeping
out those disguised as legitimate. Cyber security plays a game of
offense and defense by making sure those highly dangerous attacks
are not missed while allowing others access.
Tips:
At the top you will find an Agenda which details what is going be
discussed.
7
Web link:
https://catalog.gpo.gov/F?RN=201560918
Abstract:
Example tips:
In the 2nd section of the report you can find information about
why the Joint Task Force was established.
8
If you are curious as to what other changes CENTCOM made
aside from adding the Analytical Review Team, you can find that
in the 3rd section.
Tips:
Use the dropdown menu if you know you are looking for
something specific such as a title, author or subject.
9
The Statistical Abstract of the United States
Web Link:
http://www.census.gov/library/publications/time-
series/statistical_abstracts.html
Abstract:
10
within the United States throughout the years. This helps you better
analyze and prepare for new and more dangerous threats that were
not considered threats several years ago. Throughout the years
society changes and because of this laws change as well. These stats
can help us better understand what were analyzing and prepare better
for the future.
Tips:
Web link:
https://www.dhs.gov/topic/cybersecurity-jobs
Abstract:
Cyber security has become a job in high demand, as the years have
gone by. It has become a job that is needed in all types of
organizations, industries, companies, as well as agencies. The
11
Department of Homeland Security is just one of those many
organizations that are in need of this job. As of today, there are over
half a million-job openings in America in information technology (IT)
fields such as cyber security. Aside from not only being a job that
consists of many different opportunities, it is also a job that pays really
well. The average IT related job earns on average at least 50 percent
more that the average private sector job. This makes the many
opportunities so much worth it. Some examples of the different sectors
cyber security jobs can be found at are within healthcare, retail,
manufacturing, financial services, and national security. The need for
this work field has become so big that president Obama made it a key
concern to help Americans connect to IT related jobs. He believed that
this would help the nation in economically focusing specifically on the
middleclass.
Tips:
On the left side of the article you can find more information
about cyber security as well as different topics.
12
Web link:
https://www.dhs.gov/office-intelligence-and-analysis
Abstract:
Tips:
On the left side of the article you can find more information
about intelligence analysis as well as different topics.
Certain phrases are underlined so that you can click on them and
it will take you to more information about the topic.
13
Information and Cyber Security (ICS)
Web link:
https://ist.psu.edu/education/degree/bs/sra/ics
Abstract:
If you are interested in cyber forensics than this is a great field for you.
It allows you to adventure and explore many opportunities finding not
one of them to be identical. If you would like to be the head of security
management or the chief security officer for a company that performs
global operations than the Cyber Security option is the one for you.
This option within the major of Security and Risk Analysis (SRA)
provides many opportunities as well as exciting careers. Within this
option you will learn how to design systems that are safe and secure,
measure risk, and ensure that different levels of privacy are being
maintained for different individuals, businesses as well as
governments.
Tips:
On the left side of the page you can find more information in
regards to different programs they offer, the other majors
offered, opportunities as well as careers.
At the bottom of the page you can find a series of classes that
are required in order to obtain a bachelor in of science in security
and risk analysis with an option in information and cyber security.
14
If you are interested in obtaining more information on the
different options you may contact them through the Contact Us
link at the bottom of the page.
Web link:
https://ist.psu.edu/education/degree/bs/sra/iam
Abstract:
Tips:
15
On the left side of the page you can find more information in
regards to different programs they offer, the other majors
offered, opportunities as well as careers.
At the bottom of the page you can find a series of classes that
are required in order to obtain a bachelor in of science in security
and risk analysis with an option in information and cyber security.
16