Australian Computer Society Report: IT Security Specialist

Verified

Added on  2023/04/11

|4
|822
|99
Report
AI Summary
This report, titled 'Australian Computer Society Report,' delves into the critical role of an IT Security Specialist in the contemporary ICT landscape. The report highlights the increasing demand for IT security professionals due to the prevalence of information systems and the need for specialists in various domains, such as cyber security and data analytics. The author expresses their aspiration to become an IT Security Specialist and outlines the necessary certifications, including CompTIA Security+, GIAC GCIA, CEH, and CCSA, emphasizing how these certifications will enhance their ability to adapt to changing technologies and effectively manage system risks. The report also provides two personal experiences related to cyber security incidents, including data theft from a laptop and a net banking fraud attempt, which motivated the author to develop technical skills and create innovative solutions to secure information systems. The report concludes by emphasizing the importance of skills like teamwork, leadership, and problem-solving in handling cyber-attacks and data breaches and the author's commitment to acquiring certifications to advance their career in the field.
Document Page
Running Head: Australian Computer Society 0
Australian Computer Society
Report
Student name
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Australian Computer Society 1
Answer-1
In present time, Information Communication and Technology (ICT) are highly demanded in
every industry. It has a strong reason behind it. Most of the organizations are having their own
information systems. They also require specialist for different things, such as cyber security
expert, data analytic expert, and many others. Therefore, it is required for organizations to secure
their system and it is important a professional person (Al-Saggaf, et al., 2017).
I influence from many courses in ICT, but I would like to become an IT Security Specialist. It is
a most important post in an organization. To become an IT security specialist, I require few
security certifications, such as CompTIA - Security+, GIAC - Certified Intrusion Analyst
(GCIA), EC-Council - Certified Ethical Hacker (CEH), Check Point Certified Security
Administrator (CCSA), and many others (GIAC, 2019).
It will increase ability to learn and adapt quickly to changing IT system as well as emerging
technologies in ICT. I could effectively use different software tools to monitor and manage the
risks and operations of the system. It would provide high attention to detail including proper and
integrate work with high accuracy. These certifications will provide specialised knowledge of IT
functions. All these certification develop new knowledge about the computer systems and
technologies (McDermid, 2015).
Answer -2
I had few experiences that were relate to the cyber security. I would like to discuss those work
experiences. I took an example from my previous work place. I got an issue with my laptop
working. It was not working properly and data is missing from work folder. I have confidential
data, which is most important for the organization as profit point of view as well as reputation of
the organization. I could not found the reason behind this thing then I had contacted with cyber
security expert of my organization. He has told me about the data theft from my laptop and it
was access by an unknown user via network. After that incident, I disconnected all the
connection from my laptop. I also change all the passwords of my laptops from security point of
Document Page
Australian Computer Society 2
view. As per guidance of security expert, I installed firewalls and antivirus software in my laptop
to secure access and data of my laptop.
Second experience was also surprising for me. It was a call from an unknown number and he told
me about some issues in my net banking. Therefore, he has required some basic information to
dissolve the issues. I told him debit card information then suddenly I was seen a message in my
mobile that I windrow $2000 from my bank account. I called in my bank to identify issue. I
request them to block my card and that incident. The employee of bank has told me that they did
not call him for any issue and be secure in future.
After those incidents, I felt that I have to develop these skills in myself to stop such types of
attacks. I want to develop technical knowledge of IT programs and monitoring of those systems (
Schilling , 2017). I want to create new things to secure information systems through strong
critical thinking and innovation. I also develop troubleshooting and diagnose problems in
systems related to software as well as hardware of systems (von konsky, et al., 2014).
These courses are helpful to create new skills in my selves, such as teamwork, customer service,
communication, leadership, public speaking, running meetings, problem solving, analysis, and
many more. Leadership is most important skill to manage such types of critical situation. Data
braches and cyber-attacks can be handle using better leadership and teamwork. It is a best way to
develop problem-solving skill in our selves. Troubleshooting is a process that provides lots of
experiences and learning from our work.
I would like to develop my technical skills through cyber security certification and put all those
knowledge, which are mention above to make my professional career better in that field.
Document Page
Australian Computer Society 3
References
Schilling , J., 2017. Building A Strong Foundation: How Network Architecture Dictates IT
Security. [Online]
Available at: https://www.forbes.com/sites/forbestechcouncil/2017/09/21/building-a-strong-
foundation-how-network-architecture-dictates-it-security/#4201e0c23d5b
Al-Saggaf, Y., Burmeister, O. K. & Schwartz, M., 2017. Qualifications and ethics education: the
views of ICT professionals. Australasian Journal of Information Systems, p. 21.
GIAC, 2019. GIAC Certifications: The Highest Standard in Cyber Security Certifications.
[Online]
Available at: https://www.giac.org/
McDermid, D., 2015. Ethics in ICT: an Australian perspective. 2nd ed. Australia : Pearson
Higher Education AU..
Steedman, H., Wangner, K. & Foreman, J., 2003. ICT skills in the UK and Germany: How
companies adapt and react. London: Anglo-German Foundation for the Study of Industrial
Society..
von konsky, B. R., Jones, A. & Miller, C., 2014. Visualising career progression for ICT
professionals and the implications for ICT curriculum design in higher education. Australian
Computer Society, Inc., 01, 148(1), pp. 13-20.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]