Sunteți pe pagina 1din 16

ENGLISH 202C: TECHNICAL WRITING

Internet Resource
Guide
By Erick Cerrada
February 6, 2017
Table of Contents
Preface .....
......
a. Contents and Scope...
.. 3
b. Audience and Purpose....
.. 3
c. Assumptions:.....
.. 3
d. Organization..
.. 3
e. Tips for Guide Use..
.. 4
Periodicals/Journals...
..
a. Security Risk Analysis Management.
.5 b. Cyber Security: Big Data..
........ 6
Governmental Resources....
...
a. The Catalog of U.S. Government
Publications..... 7
b. The Statistical Abstract of the United
States.9
Homeland Security

.
a. Cyber Security Jobs...
.10
b. Office of Intelligence and
Analysis.. 11
Penn State Resources.
..
a. Information and Cyber Security (ICS)
12
b. Intelligence Analysis and Modeling (IAM)...
.. 13

2
Preface

Contents and Scope:

This Internet Resource Guide consists of information obtained


from various different websites that ranges form academics to
professional journals. It is created to provide the audience with a
detailed overview of the major Security and Risk Analysis and better
informing them about all the possibilities within that major. The major
is made up of two options that are Information and Cyber Security as
well as Intelligence Analysis and Modeling. In this guide you will learn
about these two options as well as their differences. This will help you
be able to pick which path you want to go down within the major of
Security and Risk Analysis.

Audience and Purpose:

This guide was created for the use of freshman Penn State
college students in the college of Information Sciences and Technology
(IST) who intend to pursue a major Security and Risk Analysis but do
not know what option to pick from. In this guide you will find resources
relating to these options to better prepare you and help you make the
right decision.

Assumptions:

A main assumption of this guide is that it limits you to only these


two options within the college of Security and Risk Analysis. This

3
however is not true because from the links provided, you are able to
explore and find many more careers using the same websites. These
links are specific to the purpose of this guide but are not the only way
they are useful.

Organization:

This Internet Resource Guide is made up of several sections. The


first section includes periodical/journal websites that are professionally
designed to provide insights of the overall career without getting into
the different options just quite yet. The second section includes
governmental resources. These resources consist of the Catalog of U.S.
Government Publications and the Statistical Abstract of the United
States. Within these sources you will find information relevant to the
field of study. In the third section you will find detailed descriptions
from the Department of Homeland Security concerning Cyber Security
Jobs and the Office of Intelligence and Analysis. The last section will
provide University resources from the college of ISTs website at Penn
State. Each source will be followed by a description of what you can
find at the website followed by tips that help you go through the source
most efficiently.

Tips for Guide Use:


If you are looking for specific information, the table of content
may tell you exactly where to find that information the fastest.
The websites are in blue with an underline allowing you to be
able to click on them and itll take you straight to the page.
Topics are written in bold.
Access to PDF files is preferred in order to be able to open certain
sources.

4
Security Risk Analysis Management

Web link:

http://journal.ahima.org/2011/02/28/security-risk-analysis-updated-
brief-available/

Abstract:

AHIMA explains the importance for Security Risk Analysis Management


and how it is critical within their company. AHIMA stands for American
Health Information Management. It is one of the professional
associations that work with health information. Its job is to provide
people with quality health care by managing the many different health
records for thousands of patients. It is in charge of a variety of records

5
that include paper records as well as electronic ones. In this journal,
AHIMA mentions how critical Security and Risk Analysis is to their
infrastructure. As time has progressed, organizations such as this one
have been required to conduct or review a security risk analysis. The
company has released an updated practice brief that provides step-by-
step guidance as to how to perform a risk analysis. This was
established to ensure that there were no breaches to patients
information as we move into a more technological future. This shows
how Security and Risk Analysis majors are the future of technology.
AHIMA is an example of how various organizations are being required
to consider such risks for the success of their organizations.

Tips:

If you click on the authors name at the top, it will take you to her
different journal entries establishing more credibility on the
subject.

If you are interested in other topics from AHIMA, go to the


News tab and a drop down menu will appear about their
different categories such as Informatics/Data Analytics,
Information Governance, Privacy and Security and many more.

Cyber Security: Big Data

Web link:

https://ntrs.nasa.gov/archive/nasa/casi.ntrs.nasa.gov/20150018054.pdf

Abstract:

6
The National Aeronautics and Space Administration (NASA) provides an
overview of why Cyber Security is important in their organization
through the means of Big Data. Big Data has been a problem in cyber
security because the Data Computation Centers are being in constant
attack due to the fact that they are Internet accessible. Internet traffic
is going in and out creating huge amounts of data that are vulnerable
to any attack. This is where cyber security becomes effective. The goal
of cyber security is to identify verify that the users getting access to
the Data Computation Center are legitimate and are only obtaining the
data in which they are allowed to obtain. Within NASA, cyber security
finds attacks and stops them from becoming bigger threats. Its job is to
allow authorized users into the Data Computation Center while keeping
out those disguised as legitimate. Cyber security plays a game of
offense and defense by making sure those highly dangerous attacks
are not missed while allowing others access.

Tips:

At the top you will find an Agenda which details what is going be
discussed.

You can find more information on the topic on NASAs website at


the very top.

Words in red show critical information on the topic.

As you continue to read through, you will find different strategies


for detecting attacks.

The Catalog of U.S. Government Publications

7
Web link:

https://catalog.gpo.gov/F?RN=201560918

Abstract:

The Catalog of U.S. Government Publications is a tool that enables you


to search for a number of publications within the United States
government. It contains documents that range in all types of topics.
This catalog allows you to search for titles, authors, subject, keywords,
as well as topics using their search engine. It will take you to direct
links to the full documents for the ones that are available.

An example of a document that can be found in the Catalog of U.S.


Government Publications is the U.S. House of Representatives joint
task force on U.S. central command intelligence analysis. This
document describes the various topics that relate to the task forces
findings. It details what they are and what their investigation is. The
most important thing as a Security and Risk Analysis major with an
option in Intelligence Analysis Modeling is the section concerning their
Analytical Review Team. In this section, it mentions how the CENTCOM
Intelligence Directorate created an Analytic Review Team in order to
better the quality of their products as well as their consistency. This
team began with a single individual but eventually grew into several
senior reviewers. This tells us how technology appears to be growing in
yet another area. The need for an entire team in the Analytical aspect
of the U.S. House of Representatives shows that even big
establishments that impact our nation are in need in this field.

Example web link:


https://permanent.access.gpo.gov/gpo71258/house_jtf_on_centcom_int
elligence_initial_report.pdf_%60.pdf

Example tips:

The analytical Review Team information is on page 8 of the


report.

In the 2nd section of the report you can find information about
why the Joint Task Force was established.

8
If you are curious as to what other changes CENTCOM made
aside from adding the Analytical Review Team, you can find that
in the 3rd section.

Tips:

Be as specific as possible in your searches to limit results.

Use the dropdown menu if you know you are looking for
something specific such as a title, author or subject.

9
The Statistical Abstract of the United States

Web Link:

http://www.census.gov/library/publications/time-
series/statistical_abstracts.html

Abstract:

Throughout this website you are able to find statistical information


from the United States that leads all the way back to the 1870s up to
the year 2012. It is broken up into different columns for every century.
Each year has its own link that takes you to the different categories
available for statistical information. In this next page you can find
information about a variety of topics ranging from population to
information and communications.

An example of information relating to the Security and Risk Analysis


major that can be obtained from this tool is statistical information
relating to National Security. This information can be very important for
someone going into the Intelligence Analysis Modeling option as well
as the Cyber Security option because it allows you to see the changes

10
within the United States throughout the years. This helps you better
analyze and prepare for new and more dangerous threats that were
not considered threats several years ago. Throughout the years
society changes and because of this laws change as well. These stats
can help us better understand what were analyzing and prepare better
for the future.

Tips:

Download the PDF format of the category you choose to be able


to see more detailed information.

Narrow down your topic to a single year as well as a single


category to get more detailed information.

Cyber Security Jobs

Web link:

https://www.dhs.gov/topic/cybersecurity-jobs

Abstract:

Cyber security has become a job in high demand, as the years have
gone by. It has become a job that is needed in all types of
organizations, industries, companies, as well as agencies. The

11
Department of Homeland Security is just one of those many
organizations that are in need of this job. As of today, there are over
half a million-job openings in America in information technology (IT)
fields such as cyber security. Aside from not only being a job that
consists of many different opportunities, it is also a job that pays really
well. The average IT related job earns on average at least 50 percent
more that the average private sector job. This makes the many
opportunities so much worth it. Some examples of the different sectors
cyber security jobs can be found at are within healthcare, retail,
manufacturing, financial services, and national security. The need for
this work field has become so big that president Obama made it a key
concern to help Americans connect to IT related jobs. He believed that
this would help the nation in economically focusing specifically on the
middleclass.

Tips:

On the left side of the article you can find more information
about cyber security as well as different topics.

In the search bar you can look up more information relating to


their field within the Department of Homeland Security as well as
jobs available.

If you are more interested in Obamas agenda concerning the


middle class and his IT initiative, you can find more information
about it by clicking on the link in that paragraph.

Office of Intelligence and Analysis

12
Web link:

https://www.dhs.gov/office-intelligence-and-analysis

Abstract:

The Department of Homeland Security has an Office of Intelligence and


Analysis where their job is to provide the Homeland Security Enterprise
with intelligence and information that plays a critical role in keeping
the Homeland safe. Homeland Security is a huge department in which
its job is simply to ensure the safety of the United States from any type
of terrorism or any other harmful threats to the nation. This is a job
that is very much needed due to the increase in terrorist attacks
throughout the years. Being able to analyze different information
through the means of different technological tools gives you a good
advantage in the work field. This office is a member of the U.S.
Intelligence Community (IC) and is the only member in charge of
delivering intelligence to our state, local, tribal, territorial and private
sector partners as well as developing intelligence from those partners
for the Department and the Intelligence Community. Some of the goals
that this office consists of are increasing operational effectiveness
against threats to Border Security, improving the Cyber networks, and
advising decision-makers on effective ways to counter violent
extremism.

Tips:

On the left side of the article you can find more information
about intelligence analysis as well as different topics.

Certain phrases are underlined so that you can click on them and
it will take you to more information about the topic.

In the search bar you can look up more information relating to


their field within the Department of Homeland Security as well as
jobs available.

13
Information and Cyber Security (ICS)

Web link:

https://ist.psu.edu/education/degree/bs/sra/ics

Abstract:

If you are interested in cyber forensics than this is a great field for you.
It allows you to adventure and explore many opportunities finding not
one of them to be identical. If you would like to be the head of security
management or the chief security officer for a company that performs
global operations than the Cyber Security option is the one for you.
This option within the major of Security and Risk Analysis (SRA)
provides many opportunities as well as exciting careers. Within this
option you will learn how to design systems that are safe and secure,
measure risk, and ensure that different levels of privacy are being
maintained for different individuals, businesses as well as
governments.

Tips:

On the left side of the page you can find more information in
regards to different programs they offer, the other majors
offered, opportunities as well as careers.

At the bottom of the page you can find a series of classes that
are required in order to obtain a bachelor in of science in security
and risk analysis with an option in information and cyber security.

14
If you are interested in obtaining more information on the
different options you may contact them through the Contact Us
link at the bottom of the page.

Intelligence Analysis and Modeling (IAM)

Web link:

https://ist.psu.edu/education/degree/bs/sra/iam

Abstract:

If you are interested in how todays global environment and emerging


technologies are shaping U.S. foreign policy than this option might be
of interest to you. For you to feel like you are very interested in this
option, you would have to be the type of person that can see yourself
performing risk analyses on attacks including using intelligence
gathered to determine the likelihood of the attacks. In order to excel
with this option you will need to be able to think critically and be
interested in learning how to protect various different companies and
businesses against attacks of different forms. The biggest areas of stud
in this field consist of online privacy, intelligence, and security. Many of
the risks that are evaluated in a position of an Intelligence analysis and
modeling person are associated with business decisions.

Tips:

15
On the left side of the page you can find more information in
regards to different programs they offer, the other majors
offered, opportunities as well as careers.

At the bottom of the page you can find a series of classes that
are required in order to obtain a bachelor in of science in security
and risk analysis with an option in information and cyber security.

If you are interested in obtaining more information on the


different options you may contact them through the Contact Us
link at the bottom of the page.

16

S-ar putea să vă placă și