logo

Australian Computer Society

4 Pages822 Words99 Views
   

Added on  2023-04-11

About This Document

This document is a report on the Australian Computer Society and its significance in the realm of Information Communication and Technology (ICT). It discusses the demand for ICT professionals in various industries and the need for organizations to secure their systems. The report also highlights the qualifications and certifications required to become an IT Security Specialist.

Australian Computer Society

   Added on 2023-04-11

ShareRelated Documents
Running Head: Australian Computer Society 0
Australian Computer Society
Report
Student name
Australian Computer Society_1
Australian Computer Society 1
Answer-1
In present time, Information Communication and Technology (ICT) are highly demanded in
every industry. It has a strong reason behind it. Most of the organizations are having their own
information systems. They also require specialist for different things, such as cyber security
expert, data analytic expert, and many others. Therefore, it is required for organizations to secure
their system and it is important a professional person (Al-Saggaf, et al., 2017).
I influence from many courses in ICT, but I would like to become an IT Security Specialist. It is
a most important post in an organization. To become an IT security specialist, I require few
security certifications, such as CompTIA - Security+, GIAC - Certified Intrusion Analyst
(GCIA), EC-Council - Certified Ethical Hacker (CEH), Check Point Certified Security
Administrator (CCSA), and many others (GIAC, 2019).
It will increase ability to learn and adapt quickly to changing IT system as well as emerging
technologies in ICT. I could effectively use different software tools to monitor and manage the
risks and operations of the system. It would provide high attention to detail including proper and
integrate work with high accuracy. These certifications will provide specialised knowledge of IT
functions. All these certification develop new knowledge about the computer systems and
technologies (McDermid, 2015).
Answer -2
I had few experiences that were relate to the cyber security. I would like to discuss those work
experiences. I took an example from my previous work place. I got an issue with my laptop
working. It was not working properly and data is missing from work folder. I have confidential
data, which is most important for the organization as profit point of view as well as reputation of
the organization. I could not found the reason behind this thing then I had contacted with cyber
security expert of my organization. He has told me about the data theft from my laptop and it
was access by an unknown user via network. After that incident, I disconnected all the
connection from my laptop. I also change all the passwords of my laptops from security point of
Australian Computer Society_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Importance of Cybersecurity
|3
|501
|340

PHD APPLICATION.
|2
|343
|84

Cyber Law: Overview, In-house Built System, Obligations of University A
|20
|1040
|29

Human Resource Management And Advertisement Analysis
|6
|1040
|18

ENGR9742 - Standards, Ethics & Compliance
|14
|3407
|130

Professional Skills in Information Communication Technology pdf
|3
|600
|57