Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
GITA March 2015 Newsletter
1. GITA
Leadership
• • •
Wendy Woodward
President
Janet Huggins
Secretary
Dr. Desiree DePriest
Faculty Advisor
Dr. Michael McGivern
Faculty Advisor
Newsletter Date
Volume 3 Issue 3
GITAGraduate Information
Technology Association
I N S I D E T H I S I S S U E
1 Welcome
1 What Did I Miss?
2 Current Projects
3 Tech Talk
4-5 Cyber Security- Supply
and Demand
6 Check This Out!
6-7 Announcements
8 GITA Code of Ethics
8 GITA Mission
8 Contact
Welcome GITANOS!
Our guest speaker for March’s GITA Members
meeting will be Dr. Lynne Williams who will present "The
Internet of Things”. GITA’s Member meeting will be held
March 24, 2015 at 8:30 pm ET.
What Did I Miss?
By Tiana Lawson
For those of you who missed our meeting in January, you missed a
good presentation by Dr. Stephen Beyer on "Success After graduation". He
touched on the skills that were necessary in most positions and that applied
to all job applicants in general, business job applicants and IT job
applicants. The skills that are recommended for most jobs are
communication, critical thinking, previous work experience,
Technology/social and digital media, Leadership, professional networking,
Industry certifications, negotiating skills. Dr. Beyer also touched on Ben
Franklin's 13 Virtues that he believed led to Franklin's success. At the end
of his presentation he also shared a poem that touched on the Virtue of
Tranquility that really sums up most of the other virtues as well. The poem is
called If by Rudyard Kipling. Dr. Beyer’s states this poem can help us
realize that even though we may have some ups and downs in the
corporate world, we have to still keep pushing on during these times.
For more information on Benjamin Franklin’s 13 Virtues, visit the
Department of State’s website: http://www.state.gov/m/a/os/64663.htm
For more information on If by Rudyard Kipling, visit:
http://www.kiplingsociety.co.uk/poems_if.htm
2. Page 2 Volume 3 Issue 3
Current Project Updates
IT Security & Assurance Project Updates
The March topic is complete and emailed for posting. Here is a blurb about
the Security & Assurance group’s write up for March:
Need some ideas of how to better secure your small business? Maybe you
need a quick checklist to give to a fellow chamber member who needs some ideas.
Check out the Security & Assurance group’s article for March: Physical Security:
Small Business.
April’s topic is in the works and working with Brenda Remus on a presentation date
for Techie Thursday.
Database Project Updates
The Database team has access to the database server. The Database group
is finding out what is contained within the database and assessing what needs to be
done to bring it current. They are working with the Newsletter/Marketing team on the
GITA website.
Facebook Project Updates
The Facebook team has been upgraded from a Facebook page to a
Facebook Group. Topics are added often that relate to current events in technology
to events that are hosted by GITA.
Homeroom Project Updates
The Homeroom is updated periodically with information pertaining to the projects. A
new appearance for the Homeroom is being researched and any suggestions are
welcome.
Newsletter/Marketing Project Updates
The Newsletter/Marketing team are working on the Community Outreach
Project Brochure and working on the GITA website.
3. Volume 2 Issue 6Page 3
Do you want to be a digital spy?
The CIA is going through a major reorganization. The reorganization is getting rid of many of the current
divisions. 10 new centers will be created based on the model that the Counterterrorism Center was built on. The
new centers will have analysts and operators working as teams and expand the focus to include digital
espionage. The goal is to create seamless coverage throughout every region and functionality. Read the details
at http://www.msn.com/en-us/news/us/cia-plans-major-reorganization-and-a-focus-on-digital-espionage/ar-
AA9tiCw.
Do you have a cell phone charger I can borrow?
There are moments where a person finds themselves with a low cell phone battery trying to make it last
until you can get to a charger. How about just placing your phone on a table to charge? At the Mobile World
Congress Samsung released the Galaxy S6 that comes with the capability for wireless charging. Ikea is in the
process of creating furniture line that is equipped with spots for wireless charging. Check it out at
http://www.msn.com/en-us/news/technology/got-a-phone-charger-no-just-a-wireless-pad-on-a-desk/ar-AA9soZ6.
Drones are being used for good.
Searching for archaeological sites on foot can be very time consuming and difficult, to say the least. By
outfitting surveillance drones with thermal imaging technology, ancient structures have been located underneath
the New Mexican desert. It seems that underground structures retain heat a little differently than the
surroundings. It sounds pretty cool, check it out at: http://www.msn.com/en-us/news/other/lost-civilizations-
found-by-drones/ar-BBigGio.
This issues big question for its readers:
Do you still have the original, factory default, username and password on your router? If so,
you should really change it. If someone knows what kind of router you have, they can easily get in if
you don’t change the username and password.
Tech Talk
By Donna Landers
4. Page 4 Volume 3 Issue 3
Cyber Security- Supply and Demand
By Kevin Moore, MSIT, CCENT, SEC+
Sr. State IT Security Engineer
In this newsletter I will give you information that is utterly exciting for those of you who
wish to join the ranks of IT Security personnel. The information is neither hyperbole nor
aggrandizement of the profession. Information security counts and it is one the most sought after
skills with very little qualified professionals to fill the void. However, because of its integral
association in business, government, social networks, and life in general. We are embarking
upon some of the most revealing times in our history of technology. Computers have become
more powerful and less expensive thereby opening the door for less sophisticated attackers to
gain access to some pretty secure networks. In technology, the more complex the design of your
application you would gather this is a great thing for security. Quite the contrary, the more
complex a system the more avenues that can be exploited and scanned for vulnerabilities. This
concept of complexity is being manipulated by some hacker whose main focus is to seek one
weakness in a sea of many. After the vulnerability has been discovered there are steps that an
attacker initializes (left out of this newsletter for security concerns) that can render an entire
network compromised and a host of events transpire after the breach is detected. One of the
vestiges of a security breach that really needs to be relayed is the loss of consumer confidence.
That entails the customer retention factor as well as future prospective clients. A significant
breach can cause significant damage to a thriving company as well as destroy a burgeoning
enterprise. That’s is the significance of Cyber security and its importance is tacit throughout the
realm of information technology and business. Business is synonymous with IT and it is the
vehicle that drives innovation and access. You can’t have one without the other and therefore
that access has to be guarded at all costs. `
My perspective on the profession may be well received but let me tout some of the
statistics that corroborate my claims. Median salary for an Information Security Analyst in 2012
was around $86,170 per year with a Bachelor’s degree and less than 5 years of experience.
There were about 75,100 jobs openings for the year of 2012 and it states that the growth has
been about 37% per year far above the growth for other professions.
Information Security Analysts plan and carry out security measures to protect an
organization’s computer network and systems. Their responsibilities are continually expanding as
the number of cyberattacks increases. The role of the Information Technology Security
Operations Engineer is virtually the same function but we deal with the analytics as well as the
operations side of the profession. I have been instrumental in designing procedures to follow as a
Sr. IT Security Operations Engineer as well as creating reports to garner those results. I am part
of a security incident response team as well as execute forensics investigations, prepare reports,
conduct penetration testing, malware analysis, malware reverse engineering, network monitoring,
packet inspection, and a host of other duties that deal with policies, procedures, and standards.
We also advise users of the latest technologically sound methods to protect the network from
user oriented vulnerabilities. Another one of our job functions is to stay informed on the latest
security trends that may become an issue for us as security professionals. Education never stops
as a security professional and I thrive on these expectations of security. Demand for information
security analysts is expected to be very high as these analysts will be needed to come up with
innovative solutions to prevent hackers from stealing critical information or creating havoc on
computer networks. As security professionals we are only as good as our last mitigation so we
must constantly adapt to stay a step ahead of the attackers. There are many occupations that are
similar to IT Security Analysts and IT Security Engineers here are a few occupations with their
associated data:
$ $
5. Volume 2 Issue 6Page 5
Cyber Security- Supply and Demand “(cont.)”
Salaries ranging from $120,000 - $47,000
Computer and Information Research Scientists
• Doctoral or professional degree required
• Computer and information research scientists invent and design new approaches to
computing technology and find innovative uses for existing technology. They study and
solve complex problems in computing for business, medicine, science, and other fields.
Computer and Information Systems Managers
• Bachelor’s degree required
• Computer and information systems managers, often called information technology (IT)
managers or IT project managers, plan, coordinate, and direct computer-related activities
in an organization. They help determine the information technology goals of an
organization and are responsible for implementing computer systems to meet those
goals.
Computer Support Specialist
• Associate’s degree or varied years of experience
• Computer support specialists provide help and advice to people and organizations using
computer software or equipment. Some, called computer network support specialists,
support information technology (IT) employees within their organization. Others, called
computer user support specialists, assist non-IT users who are having computer
problems.
To become a security professional there are a myriad of ways to achieve this goal.
Education for me along with experience and certifications was my route to achieving my profession
but work experience in the profession and or licenses, certifications, and registrations may be an
avenue. Some reach this goal by career advancement. I have heard of some IT professionals
starting out at an organization with a totally unrelated job function and making their way to IT. It can
be done but I would advise the more traditional route. Kaplan was an excellent vehicle for my
advancement and enrichment that definitely propelled my career to new heights and I am grateful
for its program achieving my Master’s in October of 2014. The degree is not a prerequisite of an IT
security position but it is definitely a vehicle that provides more options and opens more doors
which inherently leads to greater career advancement.
I will close by telling you some necessary attributes that are indicia of a competent IT
security professional in no order of importance:
1. Analytical skills. Information security analysts must carefully study computer systems and
networks and investigate any irregularities to determine if the networks have been compromised.
2. Detail oriented. Because cyberattacks can be difficult to detect, information security analysts
pay careful attention to their computer systems and watch for minor changes in performance.
3. Ingenuity. Information security analysts try to outthink cybercriminals and invent new ways to
protect their organization’s computer systems and networks.
4. Problem-solving skills. Information security analysts uncover and fix flaws in computer
systems and networks.
This concludes another article for this newsletter and remember information security counts.
References
Information Security Analysts. (2012, August 11). Retrieved March 15, 2015, from
http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-4
6. Page 6 Volume 3 Issue 3
Big at SXSW: FireChat Bypass Cellular and WiFi Networks by Becky Worley-Special
Contributor, Yahoo! Tech- March 14, 2015
This article is about a new application called Fire chat where users can post messages
which will be accessible by the general public. Fire chat can be utilized without any service
providers such as AT&T and Verizon Wireless. It is an automated connection where it is
able to reach a distance within 100 feet. It communicates information from wireless to
wireless that is also programmed on the phone. The developers are working to incorporate
the public messages to private messages for the Fire chat. The developers are working to
incorporate private messages so all the information is not exposed and to ensure that users
have privacy when they are posting on the Fire chat.
Link to article: https://www.yahoo.com/tech/sxsw-breakout-app-firechat-a-relatively-new-app-
113578160814.html
Check This Out!
By Erica Sims
Next Upcoming Meeting
If you know of anyone you would like to speak at a GITA membership meeting
please contact our secretary or place your suggestions in the GITA homeroom.
In Other News…..
GITA has leased homeroom space to the IT undergraduate interns working
for KapTechnology, a department within KapConsulting, LLC. We need graduate
students to mentor these interns in the areas of database, networking, security
assurance and web design. Those GITAnos who are active in the mentoring
committee can place this work on their resumes as advisors for
KapTechnology/KapConsulting LLC. It is a great opportunity. Contact your GITA
leadership to sign up!
Coming Soon
Community outreach project:
We would reach out to small businesses in our communities looking for IT
help. We are looking for GITA members to join this team.
Monthly Forums
Monthly forums where GITANOS would get together to network, discuss
various topics and get to know one another.
Announcements
7. Volume 2 Issue 6Page 7
Help Wanted
We still are in need of:
• Programmers
• Web Page Developers
• Business Analysts
• Security Specialists
• System Analysts
**Team Meetings**
Members of a project are required to attend and participate in those
meetings as per GITA membership requirements.
Announcements “(cont.)”
We’ve Got Cake
8. Page 8 Volume 3 Issue 3
Contact Information
President
Wendy Woodward
wendybraylee@aol.com
Secretary
Janet Huggins
Jnhuggins48@gmail.com
Database Project Manager
Donna Landers
szeliga4@yahoo.com
Facebook Project Manager
Robert Ariano
roba.afi@gmail.com
Homeroom Project Manager
Wendy Woodward
wendybraylee@aol.com
IT Security Project Managers
Pete Hernandez
petehernandez.ph.ph@gmail.com
Donna Landers
szeliga4@yahoo.com
Newsletter/Marketing Project
Managers
Tiana Lawson-Newsletter
Tiana.Lawson@gmail.com
Robert Ariano-Marketing
roba.afi@gmail.com
Sheri Clark-Marketing
sheri_clark@comcast.net
GITA Code of Ethics and Social Responsibility
As a member of GITA, I promise:
1. To regularly attend GITA meetings
2. To participate to the best of my ability
3. To participate in team meetings and projects
4. To provide fellow members with helpful, constructive support and feedback
5. To help GITA members maintain a positive, friendly environment so all
members can learn and grow
6. To serve (GITA) as an officer when called upon to do so
7. To treat fellow GITA members and its guests with courtesy and respect
8. To bring guests to member meetings so they can see the benefits that
GITA membership has to offer (opportunity to recruit)
9. To maintain honest, highly ethical standards in all GITA meetings and
activities
GITA’s Mission to Empower All GITANOS
• To gain real world experiences building solution-based projects which
contribute to the industry.
• To foster positive collaborative teamwork, and
• To provide a vehicle for members to sharpen their communication skills.
Newsletter Team
Tiana Lawson
Erica Sims
Donna Landers
Kevin Moore
Jennifer Wilburn
Find us on Facebook
https://www.facebook.com/kaplanGITA