SlideShare a Scribd company logo
1 of 8
Download to read offline
GITA
Leadership
• • •
Wendy Woodward
President
Janet Huggins
Secretary
Dr. Desiree DePriest
Faculty Advisor
Dr. Michael McGivern
Faculty Advisor
Newsletter Date
Volume 3 Issue 3
GITAGraduate Information
Technology Association
I N S I D E T H I S I S S U E
1 Welcome
1 What Did I Miss?
2 Current Projects
3 Tech Talk
4-5 Cyber Security- Supply
and Demand
6 Check This Out!
6-7 Announcements
8 GITA Code of Ethics
8 GITA Mission
8 Contact
Welcome GITANOS!
Our guest speaker for March’s GITA Members
meeting will be Dr. Lynne Williams who will present "The
Internet of Things”. GITA’s Member meeting will be held
March 24, 2015 at 8:30 pm ET.
What Did I Miss?
By Tiana Lawson
For those of you who missed our meeting in January, you missed a
good presentation by Dr. Stephen Beyer on "Success After graduation". He
touched on the skills that were necessary in most positions and that applied
to all job applicants in general, business job applicants and IT job
applicants. The skills that are recommended for most jobs are
communication, critical thinking, previous work experience,
Technology/social and digital media, Leadership, professional networking,
Industry certifications, negotiating skills. Dr. Beyer also touched on Ben
Franklin's 13 Virtues that he believed led to Franklin's success. At the end
of his presentation he also shared a poem that touched on the Virtue of
Tranquility that really sums up most of the other virtues as well. The poem is
called If by Rudyard Kipling. Dr. Beyer’s states this poem can help us
realize that even though we may have some ups and downs in the
corporate world, we have to still keep pushing on during these times.
For more information on Benjamin Franklin’s 13 Virtues, visit the
Department of State’s website: http://www.state.gov/m/a/os/64663.htm
For more information on If by Rudyard Kipling, visit:
http://www.kiplingsociety.co.uk/poems_if.htm
Page 2 Volume 3 Issue 3
Current Project Updates
IT Security & Assurance Project Updates
The March topic is complete and emailed for posting. Here is a blurb about
the Security & Assurance group’s write up for March:
Need some ideas of how to better secure your small business? Maybe you
need a quick checklist to give to a fellow chamber member who needs some ideas.
Check out the Security & Assurance group’s article for March: Physical Security:
Small Business.
April’s topic is in the works and working with Brenda Remus on a presentation date
for Techie Thursday.
Database Project Updates
The Database team has access to the database server. The Database group
is finding out what is contained within the database and assessing what needs to be
done to bring it current. They are working with the Newsletter/Marketing team on the
GITA website.
Facebook Project Updates
The Facebook team has been upgraded from a Facebook page to a
Facebook Group. Topics are added often that relate to current events in technology
to events that are hosted by GITA.
Homeroom Project Updates
The Homeroom is updated periodically with information pertaining to the projects. A
new appearance for the Homeroom is being researched and any suggestions are
welcome.
Newsletter/Marketing Project Updates
The Newsletter/Marketing team are working on the Community Outreach
Project Brochure and working on the GITA website.
Volume 2 Issue 6Page 3
Do you want to be a digital spy?
The CIA is going through a major reorganization. The reorganization is getting rid of many of the current
divisions. 10 new centers will be created based on the model that the Counterterrorism Center was built on. The
new centers will have analysts and operators working as teams and expand the focus to include digital
espionage. The goal is to create seamless coverage throughout every region and functionality. Read the details
at http://www.msn.com/en-us/news/us/cia-plans-major-reorganization-and-a-focus-on-digital-espionage/ar-
AA9tiCw.
Do you have a cell phone charger I can borrow?
There are moments where a person finds themselves with a low cell phone battery trying to make it last
until you can get to a charger. How about just placing your phone on a table to charge? At the Mobile World
Congress Samsung released the Galaxy S6 that comes with the capability for wireless charging. Ikea is in the
process of creating furniture line that is equipped with spots for wireless charging. Check it out at
http://www.msn.com/en-us/news/technology/got-a-phone-charger-no-just-a-wireless-pad-on-a-desk/ar-AA9soZ6.
Drones are being used for good.
Searching for archaeological sites on foot can be very time consuming and difficult, to say the least. By
outfitting surveillance drones with thermal imaging technology, ancient structures have been located underneath
the New Mexican desert. It seems that underground structures retain heat a little differently than the
surroundings. It sounds pretty cool, check it out at: http://www.msn.com/en-us/news/other/lost-civilizations-
found-by-drones/ar-BBigGio.
This issues big question for its readers:
Do you still have the original, factory default, username and password on your router? If so,
you should really change it. If someone knows what kind of router you have, they can easily get in if
you don’t change the username and password.
Tech Talk
By Donna Landers
Page 4 Volume 3 Issue 3
Cyber Security- Supply and Demand
By Kevin Moore, MSIT, CCENT, SEC+
Sr. State IT Security Engineer
In this newsletter I will give you information that is utterly exciting for those of you who
wish to join the ranks of IT Security personnel. The information is neither hyperbole nor
aggrandizement of the profession. Information security counts and it is one the most sought after
skills with very little qualified professionals to fill the void. However, because of its integral
association in business, government, social networks, and life in general. We are embarking
upon some of the most revealing times in our history of technology. Computers have become
more powerful and less expensive thereby opening the door for less sophisticated attackers to
gain access to some pretty secure networks. In technology, the more complex the design of your
application you would gather this is a great thing for security. Quite the contrary, the more
complex a system the more avenues that can be exploited and scanned for vulnerabilities. This
concept of complexity is being manipulated by some hacker whose main focus is to seek one
weakness in a sea of many. After the vulnerability has been discovered there are steps that an
attacker initializes (left out of this newsletter for security concerns) that can render an entire
network compromised and a host of events transpire after the breach is detected. One of the
vestiges of a security breach that really needs to be relayed is the loss of consumer confidence.
That entails the customer retention factor as well as future prospective clients. A significant
breach can cause significant damage to a thriving company as well as destroy a burgeoning
enterprise. That’s is the significance of Cyber security and its importance is tacit throughout the
realm of information technology and business. Business is synonymous with IT and it is the
vehicle that drives innovation and access. You can’t have one without the other and therefore
that access has to be guarded at all costs. `
My perspective on the profession may be well received but let me tout some of the
statistics that corroborate my claims. Median salary for an Information Security Analyst in 2012
was around $86,170 per year with a Bachelor’s degree and less than 5 years of experience.
There were about 75,100 jobs openings for the year of 2012 and it states that the growth has
been about 37% per year far above the growth for other professions.
Information Security Analysts plan and carry out security measures to protect an
organization’s computer network and systems. Their responsibilities are continually expanding as
the number of cyberattacks increases. The role of the Information Technology Security
Operations Engineer is virtually the same function but we deal with the analytics as well as the
operations side of the profession. I have been instrumental in designing procedures to follow as a
Sr. IT Security Operations Engineer as well as creating reports to garner those results. I am part
of a security incident response team as well as execute forensics investigations, prepare reports,
conduct penetration testing, malware analysis, malware reverse engineering, network monitoring,
packet inspection, and a host of other duties that deal with policies, procedures, and standards.
We also advise users of the latest technologically sound methods to protect the network from
user oriented vulnerabilities. Another one of our job functions is to stay informed on the latest
security trends that may become an issue for us as security professionals. Education never stops
as a security professional and I thrive on these expectations of security. Demand for information
security analysts is expected to be very high as these analysts will be needed to come up with
innovative solutions to prevent hackers from stealing critical information or creating havoc on
computer networks. As security professionals we are only as good as our last mitigation so we
must constantly adapt to stay a step ahead of the attackers. There are many occupations that are
similar to IT Security Analysts and IT Security Engineers here are a few occupations with their
associated data:
$ $
Volume 2 Issue 6Page 5
Cyber Security- Supply and Demand “(cont.)”
Salaries ranging from $120,000 - $47,000
Computer and Information Research Scientists
• Doctoral or professional degree required
• Computer and information research scientists invent and design new approaches to
computing technology and find innovative uses for existing technology. They study and
solve complex problems in computing for business, medicine, science, and other fields.
Computer and Information Systems Managers
• Bachelor’s degree required
• Computer and information systems managers, often called information technology (IT)
managers or IT project managers, plan, coordinate, and direct computer-related activities
in an organization. They help determine the information technology goals of an
organization and are responsible for implementing computer systems to meet those
goals.
Computer Support Specialist
• Associate’s degree or varied years of experience
• Computer support specialists provide help and advice to people and organizations using
computer software or equipment. Some, called computer network support specialists,
support information technology (IT) employees within their organization. Others, called
computer user support specialists, assist non-IT users who are having computer
problems.
To become a security professional there are a myriad of ways to achieve this goal.
Education for me along with experience and certifications was my route to achieving my profession
but work experience in the profession and or licenses, certifications, and registrations may be an
avenue. Some reach this goal by career advancement. I have heard of some IT professionals
starting out at an organization with a totally unrelated job function and making their way to IT. It can
be done but I would advise the more traditional route. Kaplan was an excellent vehicle for my
advancement and enrichment that definitely propelled my career to new heights and I am grateful
for its program achieving my Master’s in October of 2014. The degree is not a prerequisite of an IT
security position but it is definitely a vehicle that provides more options and opens more doors
which inherently leads to greater career advancement.
I will close by telling you some necessary attributes that are indicia of a competent IT
security professional in no order of importance:
1. Analytical skills. Information security analysts must carefully study computer systems and
networks and investigate any irregularities to determine if the networks have been compromised.
2. Detail oriented. Because cyberattacks can be difficult to detect, information security analysts
pay careful attention to their computer systems and watch for minor changes in performance.
3. Ingenuity. Information security analysts try to outthink cybercriminals and invent new ways to
protect their organization’s computer systems and networks.
4. Problem-solving skills. Information security analysts uncover and fix flaws in computer
systems and networks.
This concludes another article for this newsletter and remember information security counts.
References
Information Security Analysts. (2012, August 11). Retrieved March 15, 2015, from
http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-4
Page 6 Volume 3 Issue 3
Big at SXSW: FireChat Bypass Cellular and WiFi Networks by Becky Worley-Special
Contributor, Yahoo! Tech- March 14, 2015
This article is about a new application called Fire chat where users can post messages
which will be accessible by the general public. Fire chat can be utilized without any service
providers such as AT&T and Verizon Wireless. It is an automated connection where it is
able to reach a distance within 100 feet. It communicates information from wireless to
wireless that is also programmed on the phone. The developers are working to incorporate
the public messages to private messages for the Fire chat. The developers are working to
incorporate private messages so all the information is not exposed and to ensure that users
have privacy when they are posting on the Fire chat.
Link to article: https://www.yahoo.com/tech/sxsw-breakout-app-firechat-a-relatively-new-app-
113578160814.html
Check This Out!
By Erica Sims
Next Upcoming Meeting
If you know of anyone you would like to speak at a GITA membership meeting
please contact our secretary or place your suggestions in the GITA homeroom.
In Other News…..
GITA has leased homeroom space to the IT undergraduate interns working
for KapTechnology, a department within KapConsulting, LLC. We need graduate
students to mentor these interns in the areas of database, networking, security
assurance and web design. Those GITAnos who are active in the mentoring
committee can place this work on their resumes as advisors for
KapTechnology/KapConsulting LLC. It is a great opportunity. Contact your GITA
leadership to sign up!
Coming Soon
Community outreach project:
We would reach out to small businesses in our communities looking for IT
help. We are looking for GITA members to join this team.
Monthly Forums
Monthly forums where GITANOS would get together to network, discuss
various topics and get to know one another.
Announcements
Volume 2 Issue 6Page 7
Help Wanted
We still are in need of:
• Programmers
• Web Page Developers
• Business Analysts
• Security Specialists
• System Analysts
**Team Meetings**
Members of a project are required to attend and participate in those
meetings as per GITA membership requirements.
Announcements “(cont.)”
We’ve Got Cake
Page 8 Volume 3 Issue 3
Contact Information
President
Wendy Woodward
wendybraylee@aol.com
Secretary
Janet Huggins
Jnhuggins48@gmail.com
Database Project Manager
Donna Landers
szeliga4@yahoo.com
Facebook Project Manager
Robert Ariano
roba.afi@gmail.com
Homeroom Project Manager
Wendy Woodward
wendybraylee@aol.com
IT Security Project Managers
Pete Hernandez
petehernandez.ph.ph@gmail.com
Donna Landers
szeliga4@yahoo.com
Newsletter/Marketing Project
Managers
Tiana Lawson-Newsletter
Tiana.Lawson@gmail.com
Robert Ariano-Marketing
roba.afi@gmail.com
Sheri Clark-Marketing
sheri_clark@comcast.net
GITA Code of Ethics and Social Responsibility
As a member of GITA, I promise:
1. To regularly attend GITA meetings
2. To participate to the best of my ability
3. To participate in team meetings and projects
4. To provide fellow members with helpful, constructive support and feedback
5. To help GITA members maintain a positive, friendly environment so all
members can learn and grow
6. To serve (GITA) as an officer when called upon to do so
7. To treat fellow GITA members and its guests with courtesy and respect
8. To bring guests to member meetings so they can see the benefits that
GITA membership has to offer (opportunity to recruit)
9. To maintain honest, highly ethical standards in all GITA meetings and
activities
GITA’s Mission to Empower All GITANOS
• To gain real world experiences building solution-based projects which
contribute to the industry.
• To foster positive collaborative teamwork, and
• To provide a vehicle for members to sharpen their communication skills.
Newsletter Team
Tiana Lawson
Erica Sims
Donna Landers
Kevin Moore
Jennifer Wilburn
Find us on Facebook
https://www.facebook.com/kaplanGITA

More Related Content

What's hot

Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain BGA Cyber Security
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud versionEoin Keary
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber securityGopiRajan4
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMRick Bouter
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityKeith Redman
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNorth Texas Chapter of the ISSA
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 

What's hot (20)

Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...Open Source Insight: Happy Birthday Open Source and Application Security for ...
Open Source Insight: Happy Birthday Open Source and Application Security for ...
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Web security – everything we know is wrong cloud version
Web security – everything we know is wrong   cloud versionWeb security – everything we know is wrong   cloud version
Web security – everything we know is wrong cloud version
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Whitepaper Avira about Artificial Intelligence to cyber security
Whitepaper Avira  about Artificial Intelligence to cyber securityWhitepaper Avira  about Artificial Intelligence to cyber security
Whitepaper Avira about Artificial Intelligence to cyber security
 
Staying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBMStaying ahead in the cyber security game - Sogeti + IBM
Staying ahead in the cyber security game - Sogeti + IBM
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information InsecurityWorld of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 

Viewers also liked

Ilmastonmuutos taukojumppa
Ilmastonmuutos taukojumppaIlmastonmuutos taukojumppa
Ilmastonmuutos taukojumppaMarko Seikkula
 
ветераны
ветераныветераны
ветераныBojarka
 
Edu555 course info mac15 jul15
Edu555 course info mac15 jul15Edu555 course info mac15 jul15
Edu555 course info mac15 jul15Noor Syamila
 
Video Education Series: Challenges in Transracial Adoption
Video Education Series: Challenges in Transracial AdoptionVideo Education Series: Challenges in Transracial Adoption
Video Education Series: Challenges in Transracial Adoptionpactadopt
 
BizConf-2015: Шохин Леонид. Сайт как автоматический продавец
BizConf-2015: Шохин Леонид. Сайт как автоматический продавецBizConf-2015: Шохин Леонид. Сайт как автоматический продавец
BizConf-2015: Шохин Леонид. Сайт как автоматический продавецstalker-prog
 
A frame power point
A frame power pointA frame power point
A frame power pointgrayalleycat
 
Pad for item4412
Pad for item4412Pad for item4412
Pad for item4412Hank Hsu
 
The Tell-Tale Heart
The Tell-Tale HeartThe Tell-Tale Heart
The Tell-Tale Heartkayla_16
 
Land Wanted brochure Feb 2015
Land Wanted brochure Feb 2015Land Wanted brochure Feb 2015
Land Wanted brochure Feb 2015Gareth Davis
 
David Albon – Successful Entrepreneur
David Albon – Successful EntrepreneurDavid Albon – Successful Entrepreneur
David Albon – Successful EntrepreneurDavid Albon
 
Hualian cyclingpad 2015
Hualian cyclingpad 2015Hualian cyclingpad 2015
Hualian cyclingpad 2015Hank Hsu
 
SP'13 POST EUROPE PRESENTATION
SP'13 POST EUROPE PRESENTATIONSP'13 POST EUROPE PRESENTATION
SP'13 POST EUROPE PRESENTATIONAhmed Hamdi
 
Magnólia Comunicação - Eventos Corporativos
Magnólia Comunicação - Eventos CorporativosMagnólia Comunicação - Eventos Corporativos
Magnólia Comunicação - Eventos CorporativosAna Maria Gomes
 

Viewers also liked (15)

Ilmastonmuutos taukojumppa
Ilmastonmuutos taukojumppaIlmastonmuutos taukojumppa
Ilmastonmuutos taukojumppa
 
REFLEXIÓN
REFLEXIÓNREFLEXIÓN
REFLEXIÓN
 
ветераны
ветераныветераны
ветераны
 
Edu555 course info mac15 jul15
Edu555 course info mac15 jul15Edu555 course info mac15 jul15
Edu555 course info mac15 jul15
 
Video Education Series: Challenges in Transracial Adoption
Video Education Series: Challenges in Transracial AdoptionVideo Education Series: Challenges in Transracial Adoption
Video Education Series: Challenges in Transracial Adoption
 
BizConf-2015: Шохин Леонид. Сайт как автоматический продавец
BizConf-2015: Шохин Леонид. Сайт как автоматический продавецBizConf-2015: Шохин Леонид. Сайт как автоматический продавец
BizConf-2015: Шохин Леонид. Сайт как автоматический продавец
 
A frame power point
A frame power pointA frame power point
A frame power point
 
Pad for item4412
Pad for item4412Pad for item4412
Pad for item4412
 
The Tell-Tale Heart
The Tell-Tale HeartThe Tell-Tale Heart
The Tell-Tale Heart
 
Land Wanted brochure Feb 2015
Land Wanted brochure Feb 2015Land Wanted brochure Feb 2015
Land Wanted brochure Feb 2015
 
David Albon – Successful Entrepreneur
David Albon – Successful EntrepreneurDavid Albon – Successful Entrepreneur
David Albon – Successful Entrepreneur
 
Hualian cyclingpad 2015
Hualian cyclingpad 2015Hualian cyclingpad 2015
Hualian cyclingpad 2015
 
Edu555 week 1
Edu555 week 1Edu555 week 1
Edu555 week 1
 
SP'13 POST EUROPE PRESENTATION
SP'13 POST EUROPE PRESENTATIONSP'13 POST EUROPE PRESENTATION
SP'13 POST EUROPE PRESENTATION
 
Magnólia Comunicação - Eventos Corporativos
Magnólia Comunicação - Eventos CorporativosMagnólia Comunicação - Eventos Corporativos
Magnólia Comunicação - Eventos Corporativos
 

Similar to GITA March 2015 Newsletter

BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxInfosectrain3
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber securityVishal Singh
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To IgnoreGross, Mendelsohn & Associates
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 

Similar to GITA March 2015 Newsletter (20)

GITA April 2015 Newsletter
GITA April 2015 NewsletterGITA April 2015 Newsletter
GITA April 2015 Newsletter
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Cybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptxCybersecurity vs Data Science A Roadmap.pptx
Cybersecurity vs Data Science A Roadmap.pptx
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
16231
1623116231
16231
 
India's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdfIndia's Leading Cyber Security Companies_compressed.pdf
India's Leading Cyber Security Companies_compressed.pdf
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 

GITA March 2015 Newsletter

  • 1. GITA Leadership • • • Wendy Woodward President Janet Huggins Secretary Dr. Desiree DePriest Faculty Advisor Dr. Michael McGivern Faculty Advisor Newsletter Date Volume 3 Issue 3 GITAGraduate Information Technology Association I N S I D E T H I S I S S U E 1 Welcome 1 What Did I Miss? 2 Current Projects 3 Tech Talk 4-5 Cyber Security- Supply and Demand 6 Check This Out! 6-7 Announcements 8 GITA Code of Ethics 8 GITA Mission 8 Contact Welcome GITANOS! Our guest speaker for March’s GITA Members meeting will be Dr. Lynne Williams who will present "The Internet of Things”. GITA’s Member meeting will be held March 24, 2015 at 8:30 pm ET. What Did I Miss? By Tiana Lawson For those of you who missed our meeting in January, you missed a good presentation by Dr. Stephen Beyer on "Success After graduation". He touched on the skills that were necessary in most positions and that applied to all job applicants in general, business job applicants and IT job applicants. The skills that are recommended for most jobs are communication, critical thinking, previous work experience, Technology/social and digital media, Leadership, professional networking, Industry certifications, negotiating skills. Dr. Beyer also touched on Ben Franklin's 13 Virtues that he believed led to Franklin's success. At the end of his presentation he also shared a poem that touched on the Virtue of Tranquility that really sums up most of the other virtues as well. The poem is called If by Rudyard Kipling. Dr. Beyer’s states this poem can help us realize that even though we may have some ups and downs in the corporate world, we have to still keep pushing on during these times. For more information on Benjamin Franklin’s 13 Virtues, visit the Department of State’s website: http://www.state.gov/m/a/os/64663.htm For more information on If by Rudyard Kipling, visit: http://www.kiplingsociety.co.uk/poems_if.htm
  • 2. Page 2 Volume 3 Issue 3 Current Project Updates IT Security & Assurance Project Updates The March topic is complete and emailed for posting. Here is a blurb about the Security & Assurance group’s write up for March: Need some ideas of how to better secure your small business? Maybe you need a quick checklist to give to a fellow chamber member who needs some ideas. Check out the Security & Assurance group’s article for March: Physical Security: Small Business. April’s topic is in the works and working with Brenda Remus on a presentation date for Techie Thursday. Database Project Updates The Database team has access to the database server. The Database group is finding out what is contained within the database and assessing what needs to be done to bring it current. They are working with the Newsletter/Marketing team on the GITA website. Facebook Project Updates The Facebook team has been upgraded from a Facebook page to a Facebook Group. Topics are added often that relate to current events in technology to events that are hosted by GITA. Homeroom Project Updates The Homeroom is updated periodically with information pertaining to the projects. A new appearance for the Homeroom is being researched and any suggestions are welcome. Newsletter/Marketing Project Updates The Newsletter/Marketing team are working on the Community Outreach Project Brochure and working on the GITA website.
  • 3. Volume 2 Issue 6Page 3 Do you want to be a digital spy? The CIA is going through a major reorganization. The reorganization is getting rid of many of the current divisions. 10 new centers will be created based on the model that the Counterterrorism Center was built on. The new centers will have analysts and operators working as teams and expand the focus to include digital espionage. The goal is to create seamless coverage throughout every region and functionality. Read the details at http://www.msn.com/en-us/news/us/cia-plans-major-reorganization-and-a-focus-on-digital-espionage/ar- AA9tiCw. Do you have a cell phone charger I can borrow? There are moments where a person finds themselves with a low cell phone battery trying to make it last until you can get to a charger. How about just placing your phone on a table to charge? At the Mobile World Congress Samsung released the Galaxy S6 that comes with the capability for wireless charging. Ikea is in the process of creating furniture line that is equipped with spots for wireless charging. Check it out at http://www.msn.com/en-us/news/technology/got-a-phone-charger-no-just-a-wireless-pad-on-a-desk/ar-AA9soZ6. Drones are being used for good. Searching for archaeological sites on foot can be very time consuming and difficult, to say the least. By outfitting surveillance drones with thermal imaging technology, ancient structures have been located underneath the New Mexican desert. It seems that underground structures retain heat a little differently than the surroundings. It sounds pretty cool, check it out at: http://www.msn.com/en-us/news/other/lost-civilizations- found-by-drones/ar-BBigGio. This issues big question for its readers: Do you still have the original, factory default, username and password on your router? If so, you should really change it. If someone knows what kind of router you have, they can easily get in if you don’t change the username and password. Tech Talk By Donna Landers
  • 4. Page 4 Volume 3 Issue 3 Cyber Security- Supply and Demand By Kevin Moore, MSIT, CCENT, SEC+ Sr. State IT Security Engineer In this newsletter I will give you information that is utterly exciting for those of you who wish to join the ranks of IT Security personnel. The information is neither hyperbole nor aggrandizement of the profession. Information security counts and it is one the most sought after skills with very little qualified professionals to fill the void. However, because of its integral association in business, government, social networks, and life in general. We are embarking upon some of the most revealing times in our history of technology. Computers have become more powerful and less expensive thereby opening the door for less sophisticated attackers to gain access to some pretty secure networks. In technology, the more complex the design of your application you would gather this is a great thing for security. Quite the contrary, the more complex a system the more avenues that can be exploited and scanned for vulnerabilities. This concept of complexity is being manipulated by some hacker whose main focus is to seek one weakness in a sea of many. After the vulnerability has been discovered there are steps that an attacker initializes (left out of this newsletter for security concerns) that can render an entire network compromised and a host of events transpire after the breach is detected. One of the vestiges of a security breach that really needs to be relayed is the loss of consumer confidence. That entails the customer retention factor as well as future prospective clients. A significant breach can cause significant damage to a thriving company as well as destroy a burgeoning enterprise. That’s is the significance of Cyber security and its importance is tacit throughout the realm of information technology and business. Business is synonymous with IT and it is the vehicle that drives innovation and access. You can’t have one without the other and therefore that access has to be guarded at all costs. ` My perspective on the profession may be well received but let me tout some of the statistics that corroborate my claims. Median salary for an Information Security Analyst in 2012 was around $86,170 per year with a Bachelor’s degree and less than 5 years of experience. There were about 75,100 jobs openings for the year of 2012 and it states that the growth has been about 37% per year far above the growth for other professions. Information Security Analysts plan and carry out security measures to protect an organization’s computer network and systems. Their responsibilities are continually expanding as the number of cyberattacks increases. The role of the Information Technology Security Operations Engineer is virtually the same function but we deal with the analytics as well as the operations side of the profession. I have been instrumental in designing procedures to follow as a Sr. IT Security Operations Engineer as well as creating reports to garner those results. I am part of a security incident response team as well as execute forensics investigations, prepare reports, conduct penetration testing, malware analysis, malware reverse engineering, network monitoring, packet inspection, and a host of other duties that deal with policies, procedures, and standards. We also advise users of the latest technologically sound methods to protect the network from user oriented vulnerabilities. Another one of our job functions is to stay informed on the latest security trends that may become an issue for us as security professionals. Education never stops as a security professional and I thrive on these expectations of security. Demand for information security analysts is expected to be very high as these analysts will be needed to come up with innovative solutions to prevent hackers from stealing critical information or creating havoc on computer networks. As security professionals we are only as good as our last mitigation so we must constantly adapt to stay a step ahead of the attackers. There are many occupations that are similar to IT Security Analysts and IT Security Engineers here are a few occupations with their associated data: $ $
  • 5. Volume 2 Issue 6Page 5 Cyber Security- Supply and Demand “(cont.)” Salaries ranging from $120,000 - $47,000 Computer and Information Research Scientists • Doctoral or professional degree required • Computer and information research scientists invent and design new approaches to computing technology and find innovative uses for existing technology. They study and solve complex problems in computing for business, medicine, science, and other fields. Computer and Information Systems Managers • Bachelor’s degree required • Computer and information systems managers, often called information technology (IT) managers or IT project managers, plan, coordinate, and direct computer-related activities in an organization. They help determine the information technology goals of an organization and are responsible for implementing computer systems to meet those goals. Computer Support Specialist • Associate’s degree or varied years of experience • Computer support specialists provide help and advice to people and organizations using computer software or equipment. Some, called computer network support specialists, support information technology (IT) employees within their organization. Others, called computer user support specialists, assist non-IT users who are having computer problems. To become a security professional there are a myriad of ways to achieve this goal. Education for me along with experience and certifications was my route to achieving my profession but work experience in the profession and or licenses, certifications, and registrations may be an avenue. Some reach this goal by career advancement. I have heard of some IT professionals starting out at an organization with a totally unrelated job function and making their way to IT. It can be done but I would advise the more traditional route. Kaplan was an excellent vehicle for my advancement and enrichment that definitely propelled my career to new heights and I am grateful for its program achieving my Master’s in October of 2014. The degree is not a prerequisite of an IT security position but it is definitely a vehicle that provides more options and opens more doors which inherently leads to greater career advancement. I will close by telling you some necessary attributes that are indicia of a competent IT security professional in no order of importance: 1. Analytical skills. Information security analysts must carefully study computer systems and networks and investigate any irregularities to determine if the networks have been compromised. 2. Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance. 3. Ingenuity. Information security analysts try to outthink cybercriminals and invent new ways to protect their organization’s computer systems and networks. 4. Problem-solving skills. Information security analysts uncover and fix flaws in computer systems and networks. This concludes another article for this newsletter and remember information security counts. References Information Security Analysts. (2012, August 11). Retrieved March 15, 2015, from http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm#tab-4
  • 6. Page 6 Volume 3 Issue 3 Big at SXSW: FireChat Bypass Cellular and WiFi Networks by Becky Worley-Special Contributor, Yahoo! Tech- March 14, 2015 This article is about a new application called Fire chat where users can post messages which will be accessible by the general public. Fire chat can be utilized without any service providers such as AT&T and Verizon Wireless. It is an automated connection where it is able to reach a distance within 100 feet. It communicates information from wireless to wireless that is also programmed on the phone. The developers are working to incorporate the public messages to private messages for the Fire chat. The developers are working to incorporate private messages so all the information is not exposed and to ensure that users have privacy when they are posting on the Fire chat. Link to article: https://www.yahoo.com/tech/sxsw-breakout-app-firechat-a-relatively-new-app- 113578160814.html Check This Out! By Erica Sims Next Upcoming Meeting If you know of anyone you would like to speak at a GITA membership meeting please contact our secretary or place your suggestions in the GITA homeroom. In Other News….. GITA has leased homeroom space to the IT undergraduate interns working for KapTechnology, a department within KapConsulting, LLC. We need graduate students to mentor these interns in the areas of database, networking, security assurance and web design. Those GITAnos who are active in the mentoring committee can place this work on their resumes as advisors for KapTechnology/KapConsulting LLC. It is a great opportunity. Contact your GITA leadership to sign up! Coming Soon Community outreach project: We would reach out to small businesses in our communities looking for IT help. We are looking for GITA members to join this team. Monthly Forums Monthly forums where GITANOS would get together to network, discuss various topics and get to know one another. Announcements
  • 7. Volume 2 Issue 6Page 7 Help Wanted We still are in need of: • Programmers • Web Page Developers • Business Analysts • Security Specialists • System Analysts **Team Meetings** Members of a project are required to attend and participate in those meetings as per GITA membership requirements. Announcements “(cont.)” We’ve Got Cake
  • 8. Page 8 Volume 3 Issue 3 Contact Information President Wendy Woodward wendybraylee@aol.com Secretary Janet Huggins Jnhuggins48@gmail.com Database Project Manager Donna Landers szeliga4@yahoo.com Facebook Project Manager Robert Ariano roba.afi@gmail.com Homeroom Project Manager Wendy Woodward wendybraylee@aol.com IT Security Project Managers Pete Hernandez petehernandez.ph.ph@gmail.com Donna Landers szeliga4@yahoo.com Newsletter/Marketing Project Managers Tiana Lawson-Newsletter Tiana.Lawson@gmail.com Robert Ariano-Marketing roba.afi@gmail.com Sheri Clark-Marketing sheri_clark@comcast.net GITA Code of Ethics and Social Responsibility As a member of GITA, I promise: 1. To regularly attend GITA meetings 2. To participate to the best of my ability 3. To participate in team meetings and projects 4. To provide fellow members with helpful, constructive support and feedback 5. To help GITA members maintain a positive, friendly environment so all members can learn and grow 6. To serve (GITA) as an officer when called upon to do so 7. To treat fellow GITA members and its guests with courtesy and respect 8. To bring guests to member meetings so they can see the benefits that GITA membership has to offer (opportunity to recruit) 9. To maintain honest, highly ethical standards in all GITA meetings and activities GITA’s Mission to Empower All GITANOS • To gain real world experiences building solution-based projects which contribute to the industry. • To foster positive collaborative teamwork, and • To provide a vehicle for members to sharpen their communication skills. Newsletter Team Tiana Lawson Erica Sims Donna Landers Kevin Moore Jennifer Wilburn Find us on Facebook https://www.facebook.com/kaplanGITA