Cyberspace in Our Daily Lives
Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel, power our homes, run our economy, and provide government services.
Cyber Security & Ethical Hacking
The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. However, they have created significant and unprecedented risks to operations. Computer security has, in turn, become much more important as all levels of an organization to utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate of sensitive information.
After the boom in Networking and Software jobs, the past two year have seen a sharp rise in the field of information security. Information Security and Ethical Hacking is the latest buzzword in the industry. In the past five years, the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially.
- Entry Level - IS Executive Manager
- Middle Level - IS Manager
- Senior & Top Level - Chief IS Manager
- Senior & Top Level - Security Advisors / Auditors
- Senior & Top Level - Chief Information Officer
(Role: to correlate broad security guidelines of the organisation with security operations.)
(Role: Security program management, data security, ploicy creation/maintenance, business continuity/ disaster recovery)
(Role: Design and development of information security policy. Regulatory compliance, information security governance)
(Role: Advisory services for information security, policy design, risk assessment, compliance to global/industry standards)
(Role: Justifying the cost of ongoing and future investments to mitigate information risks, aligning business objectives with a concise security strategy)