Documente Academic
Documente Profesional
Documente Cultură
Lina Deen
CST 300 Writing Lab
Industry analysis paper
January 16, 2019
brief history and follow the reason behind why computers and the internet were invented and
why Cybersecurity became crucial to everyone either on a personal or business level. Machines
were created as computation devices to do repetitive computation, then in the era of WWII when
“Charles Babbage an English mechanical engineer and polymath originated the concept of a
and the use changed with time which led to the invention of the internet which was first known
as “ARPANET” that was invented to share data and information. Thus, evolved over time to the
internet we know now a day, and of course, with the internet cyber-attacks, such hacking was
born “The origin of Internet privacy issues date to before the Internet was even launched” and
Hacker is a powerful word highly misused and misunderstood that when we hear it, we
think shady business and trouble right away we also imagine an anti-social person sitting in a
dark room using his skills to no good. Nevertheless, that is how I use to think before I attended a
cybersecurity class. Moreover, and what many people don’t know that not all hackers are the
same and there are ethical hackers, and there are unethical hackers with the same level of
Deen 2
knowledge and skills. However, and what makes them different is their morality and intention
behind their actions. Moreover, the idea of hacking goes back to “pre-1970” was born out of
curiosity of some people who used their intellect to think outside of the box not in the right way.
Thus, wanted to learn and test the boundaries of the new technology, how it can be uttered and
used in a deferent way to give different results not intended in the original design. Moreover, as
technology advanced the curiosity of those individuals grew to come up with more sophisticated
and different ways that were constantly changing and becoming smarter and more advanced
From the government, financial institution, such as banks “and I work for one” to any
corporate and business big or small cybersecurity is essential and is a big part of their daily
hardware, software, and data, from cyber-attacks." Moreover, every company has a particular
department that deals with fraud and security issues and continually works on securing,
preventing, and fixing problems that can lead to a security breach or dealing with the offense
a vast industry that is continuously growing “In 2018, the global cyber security market is
expected to reach 151.67 billion U.S. dollars. The figures from 2018 to 2022 represent an
estimate based on the source-provided compound annual growth rate (CAGR) of 10.2 percent, as
well as the market revenue figure for 2017 and 2022 provided by the source.” Cybersecurity is
an industry that is growing and will always be in demand, unlike other industries and business
that perished with time and technology evolving and got replaced with new ideas.
Deen 3
I work for Wells Fargo one of the major leading financial institution in the United States a
company established in 1825 by Henry Wells and William Fargo Wells Fargo is found almost in
every State in the US where their main business being in customer service and sales. However,
Wells Fargo was not always a giant financial institution we know today, and the company went
through a life changing transformation earned a great reputation starting in the 1970s when the
company’s CEO at the time Dick Cooley “foresaw that the banking industry would eventually
undergo wrenching change.” Therefore, he went out preparing to which later on became one to
the best team of executives in history that helped the company thorough banks deregulation and
and when in 1983 many “banking industry fell 59 percent behind the general stock market, Wells
Fargo outperformed the market by over three times” becoming one of the top companies at the
time according to the book “Good to Great, by Jim Collins.” The current top executives at Wells
Fargo are David Galasso Executive Vice President head of Human Recourses. Richard Levy
EVP controller, Mary Mack Senior EVP consumer Banking. Moreover, the company offers
services such as Banking, lending, investment, and mortgages Wells Fargo provides more than
80 services and products a company that is standing firm despite the many scandals and lawsuit
that shook the company’s reputation with the latest 2016 scandals of unethical practices.
However, Wells Fargo came out strong after every issue stood and took responsibility for any
issue. Moreover, the company has a great reputation as an employer because it provides its
employees with the best benefits from the pay, 401k, medical, tuition reimbursement and many
other great benefits. However, and since Wells Fargo bank is a financial institution that deals
with money and has a lot of customers sensitive information, they are always prone to security
out breach and face a lot of danger when it comes to secure their data and protect the customer's
Deen 4
privacy that trusted them from being targeted by hackers. Therefore, aside from their finical
department Wells Fargo has a big department that deals with fraud and cybersecurity issues.
Nevertheless, and not until I took the cybersecurity plan that I understood the importance and
reason and importance behind having what it is called a program that is continuously updated
Moreover, how important for every employee to have access to the plan no matter what
their position is and to follow specific procedures such as changing the password every 90 days
and have particular requirements for a secure password. Moreover, I understood more about our
fraud department and the “report to Phishing” that we use to report any suspicious emails or texts
that we see on a daily basis where many customers come to us concerned about an email, they
got that looks like it was sent from our financial institution. However, and in fact, it is coming
from a hacker that camouflaged the email to look like it was sent from Wells Fargo.
Wells Fargo’s present trend is a new technology in cyber security called “cyber range virtual
environments where real cyber-attacks are launched on replicas of their actual IT systems” the
industry is also getting the online banking evolving and becoming advanced
I always found computers interesting, and I decided to study computer programing when I
was 14 years old about to start high school. Therefore, I went to a technical institution and
studied computer programing. However, I never worked in the field, and the languages I studied
became old and outdated, since computer languages changes and evolved a lot in the past two
decades. Therefore, that is why I decided to go back and learn the new technology all over again,
and that is when I decided to take a cybersecurity class although my major is in software
engineer. However, I thought that it is essential to learn how to protect the software and I fell in
Moreover, in the course, I learned not only about the different steps of Ethical Hacking that starts
with mapping and checking to secure but also about how it was invented, different security
breaches history of famous hackers and their techniques in hacking, information about recent
company’s security breaches. Moreover, I learned about Target in 2104 the Hilton Hotels in
2015 an even the presidential election security breach. Every business and company have a
security plan, and a cybersecurity department with employees with specialized skills called white
hat hackers work as soldiers always alerted and on the lookout for attacks. I also learned that
hacking is not all bad and there are two types of hackers the white hat hacker, and the black hat
hacker and the difference is that they both have the same skills. However, the black hat hacker
uses their expertise to perform illegal activities while the white hat hacker uses their powers to
prevent and protect from the black hat hackers’ attacks. However, it doesn’t get more
comfortable with time attacks become more sophisticated and advanced “These attacks happen
daily and are constantly evolving. In the past 50 years, cyber-attacks have evolved from little
elections”. Therefore, the need to stay updated and learn about new and advanced ways to
Pursuing a career in cybersecurity, requires a lot of work and it is essential for me as a first
step towards a achieving my goal to obtain certification and become a Certified Ethical Hacker
at first to be able to work in the industry and will be working for the company I am working for
now at their fraud prevention department. However, I have to pursue more classes since the one
class I took “Cybersecurity Ethical Hacking CS/193” is not enough. Therefore, I am in the
process of doing that since I found a program online called “EC council on the Web.,” they offer
a one-year program fully online with live instructors, online labs, certificate of completion, and
Deen 6
test prep towards the end to the program. Moreover, it is necessary to practice what I learned on
my own since I have software and books that can help me practice the skills, I learned from the
course. Moreover, an internship will be beneficial to me since learning is essential but putting to
practice what we have learned is like a glue that makes everything we learn comes together.
Also, attend seminars and convention, and one of the conventions I would like to attend is “DEF
CON” hacking conference where hackers from all over the United States attend to learn and
share new ideas and new techniques. I also would also like after I graduate as a software
and maybe help in improving cyber security issues by writing a new security software that can
help enhance cybersecurity especially issues that I see the banking industry and other business
struggling in dealing with including Wells Fargo the company I work for now. Moreover, stay
updated with the latest news, techniques, and attacks, listening to cybersecurity podcasts such as
“Braking Down Security” “Risky Business” “the Security Weekly Podcast” and many more to
help me stay informed and on track with the latest attacks, technology , and discoveries.
Becoming a Certified Ethical Hacker is not an easy process that requires a lot of
knowledge and comes with significant responsibilities and liabilities. Thus, to perform the job,
an ethical hacker needs to obtain a legal written consent from the company to conduct a
penetration test and analyze the strength of their security, the flaws that put them into a high risk
to fall a pray for an unethical hacker. Ethical Hacking is a fun job to do for a great cause that
help, protect and secure business and individuals privacy and assets from unprincipled attacks
and from falling into the wrong hands. Becoming an Ethical Hacker is a challenging career.
However, the rewards out way the difficulties, either for society or personal rewards.
Deen 7
References
https://bigdata-madesimple.com/8-breakthrough-events-in-the-history-of-cybersecurity
- Sean Philip Oriyano 2016 - CEHv9 Certified Ethical Hacker Version 9 Published
simultaneously in Canada.
https://searchsecurity.techtarget.com/definition/cybersecurity
Jim Collins2001- Good to Great Why some Companies Make the Leap and Others Don’t
https://www.history.com/topics/inventions/invention-of-the-internet
articles.latimes.com › Collections
Size of the cyber security market worldwide, from 2017 to 2023 (in billion U.S. dollars)
https://www.statista.com/statistics/595182/worldwide-security-as-a-service-market-size
The History of Cybersecurity — Everything you Ever Wanted to Know By Sentinel One
sentinelone.com/blog/history-of-cyber-security