SlideShare a Scribd company logo
1 of 8
TRENDS IN MY PROFFESSION 1
Annotated Bibliography: Trends in my profession
By
Mantenso Samia Skido-Achulo
01/31/2016
The three trends I discoveredin my research were,
1) Cyber security goes mainstream
2) Social media hacking escalates
3) 2016 is a year of security training and certifications
TRENDS IN MY PROFFESSION 2
Cyber security goes main stream
Cyber security will go mainstream in 2016 so far as technology continues to
evolve with time. “Cyber security has been an industry that has tremendously
grown over the past few years due to technology. “This is another trend that
we’ve watched grow over the past few years, but there’s no question that
cybersecurity made it to the forefront of mainstream and even pop culture focus
in 2015.” By Nate Lord Tuesday September 29, 2015 “This article published in
2015, talks about the ability of cyber security to go mainstream in the substituent
years ahead.”
IOS, android other networks and mainly organizations get attacked by
hackers yearly and this year possess to be the same. For some time now cyber
attackers have been coordinating and collaborating, trying out new tactics and
tools, and generally trying to be smarter than cyber security industry.
Due to the fact that the industry improving, we hope to see the promising
solutions to this attacks this year.
TRENDS IN MY PROFFESSION 3
Without cyber security our companies will not be protected, improving software’s will impossible
and trying to stay ahead of the hackers is not likely. The rapid increase in technology and
especially in social media , has kept cyber security in the spot light for protecting information
leakage through their devices, more attention has been put on the industry because of the great
help if offers.
“The article focuses on information security issues. Topics include cybersecurity, denial of
service (DOS) attack, and data protection.”
Due to the fact that Organization and other business and private entities , store their confidential
information on computers, laptops or any other device that makes it easier for hackers to invade
. Cyber security serves a protective tool, which is needed, and all efforts to improve every
aspect of cyber security is highly important to our nation and the world at large. To keep highly
confidential information stored
TRENDS IN MY PROFFESSION 4
Socialmedia hacking escalates
.
Social media hacking has been a problem, and will continue to be a disturbing issue,
which unfortunately does not prove to be any different so far. Hack in a situation where
a computer is trespassed by a person from a remote location .Vital information is
retrieved from this devices which could lead to very consequences.In my in-depth
research a book by Taylor & Francis says that ““In Western societies, the practice of
computer hacking is increasingly being viewed as a major security dilemma by
governments and security experts alike”
A majority of Social Networks have a huge impact on our lives and to the world
as well. Instagram, Facebook, Myspace, twitter Are driven by information technology
and ever since these networks evolved they have attracted a numerous amount of users,
unfortunately most of these followers are with the intention of hacking into people’s information
TRENDS IN MY PROFFESSION 5
All humans are vulnerable to social media attacks, so far as they do patronize social media it is
almost inevitable, some individuals are harder to trick than others but eventually a majority of
people get caught in a hacker’s game. Social media is an amazing marketing tool for a lot of
companies’ .They gets their companies more recognition but then again opens the space for
hackers to thrive.
This article says “security professionals are most concerned about targeted attacks, external
hackers and insider threats, according to a recent report from Symantec. Their jobs are made
more challenging by industry trends”
The level of social media hacking will continue to escalate with time; this is because
internet fraudsters tend to be one step ahead of their game when it comes to gaining
information from organizations, individuals and companies. Making it very dangerous to
trust confidential information on devices or mostly cloud storage.
TRENDS IN MY PROFFESSION 6
2016 is a year of security training andcertifications
An effort is been made, to address the increasing threats to the cyber security industry.
Cybersecurity training courses and certifications are taking place. Skilled, accredited
persons and industries have been opportunity to train people and award certificates to
broaden their knowledge on the industry as to how attacks and be reduced and ways to
go about them.
According to Trim, .P.J. “This book will interest government officials, policy
advisors, law enforcement officers and senior managers within companies, as well as
academics and students in a range of disciplines including management and computer
science”.
Other ways of attracting spreading awareness is by writing books .Such books
should consist of information such consequences of hacking, actions that need to be
taken and ways of preventing them. This procedure of certification and training will gain
more exposure to the industry and recruit more people in fighting hackers.
TRENDS IN MY PROFFESSION 7
Based on the outstanding amount of cyber threats, training and certification is extremely
necessary in this industry, certificates do not only prove that an individual has he
qualifications, but also assures that the knowledge needed to gain experience as employee is
valid .In out part of the world especially and considering our economic situation, training and
certification is very important for building skills, improving career opportunities.
“This article by McCrohan, K. F, presents the results of a study to determine the
impact of a cyber threat education and awareness intervention on changes in user
security behavior”
Certifications and training is necessary at all times especially during the national
cyber security and awareness month which is held in October every year. This is
important to the country since cyber threats poses to be one of the dangers the country
deals with and it will create jobs and carriers for the youth
TRENDS IN MY PROFFESSION 8
References
Everett, C. (2015). Feature: Big data – the future of cyber-security or its latest threat?. Computer
Fraud & Security, 201514-17. doi:10.1016/S1361-3723(15)30085-3
Engel, K., & Harvey, J. W. (2010). Influence of Awareness and Training on Cyber Security.
Journal Of Internet Commerce, 9(1), 23-41. doi:10.1080/15332861.2010.487415
Hackers Mobile Social Media Making IT Security A Challenge 223185. (2011). eWeek
Lamont, J. (2015). Information security goes mainstream. KM World, 24(3), 6-7.
Taylor, P. A. (1999). Preface. In , Hackers (p. 1). Ltd / Books.
Trim, P. J. (2013). Cyber security culture: counteracting cyber threats through organizational
learning and training.

More Related Content

What's hot

Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web ThreatsKim Jensen
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...IJMIT JOURNAL
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Interlat
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019BluePayProcessing
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber securityJohn Kingsley
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
 

What's hot (19)

Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
NEED FOR CRITICAL CYBER DEFENCE, SECURITY STRATEGY AND PRIVACY POLICY IN BANG...
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 

Viewers also liked

9-1 Translations.pdf
9-1 Translations.pdf9-1 Translations.pdf
9-1 Translations.pdfbwlomas
 
Fantastic1
Fantastic1Fantastic1
Fantastic1cab3032
 
Measuring Segments.pdf
Measuring Segments.pdfMeasuring Segments.pdf
Measuring Segments.pdfbwlomas
 
Food Contact & Food Additives_Laura Wang
Food Contact & Food Additives_Laura WangFood Contact & Food Additives_Laura Wang
Food Contact & Food Additives_Laura WangLaura Wang
 
Tal&Qual30030701
Tal&Qual30030701Tal&Qual30030701
Tal&Qual30030701cab3032
 
Compound Inequalities.pdf
Compound Inequalities.pdfCompound Inequalities.pdf
Compound Inequalities.pdfbwlomas
 
Chapter 12 Bingo.pdf
Chapter 12 Bingo.pdfChapter 12 Bingo.pdf
Chapter 12 Bingo.pdfbwlomas
 
Solving Literal Equations.pdf
Solving Literal Equations.pdfSolving Literal Equations.pdf
Solving Literal Equations.pdfbwlomas
 
Trig Functions 2.pdf
Trig Functions 2.pdfTrig Functions 2.pdf
Trig Functions 2.pdfbwlomas
 
Inspire Portfolio
Inspire PortfolioInspire Portfolio
Inspire Portfoliosambarori
 
12 1 tangent lines
12 1 tangent lines12 1 tangent lines
12 1 tangent linesbwlomas
 
Transmedia Storytelling in Higher Education
Transmedia Storytelling in Higher EducationTransmedia Storytelling in Higher Education
Transmedia Storytelling in Higher EducationFelicia Pride
 
Tema 14 Origen y estructura de la tierra
Tema 14 Origen y estructura de la tierraTema 14 Origen y estructura de la tierra
Tema 14 Origen y estructura de la tierraEduardo Gómez
 

Viewers also liked (19)

9-1 Translations.pdf
9-1 Translations.pdf9-1 Translations.pdf
9-1 Translations.pdf
 
Aulaclic y aulafacil
Aulaclic y aulafacilAulaclic y aulafacil
Aulaclic y aulafacil
 
MohamedHefnyKassem
MohamedHefnyKassemMohamedHefnyKassem
MohamedHefnyKassem
 
Fantastic1
Fantastic1Fantastic1
Fantastic1
 
Measuring Segments.pdf
Measuring Segments.pdfMeasuring Segments.pdf
Measuring Segments.pdf
 
Food Contact & Food Additives_Laura Wang
Food Contact & Food Additives_Laura WangFood Contact & Food Additives_Laura Wang
Food Contact & Food Additives_Laura Wang
 
Tal&Qual30030701
Tal&Qual30030701Tal&Qual30030701
Tal&Qual30030701
 
Compound Inequalities.pdf
Compound Inequalities.pdfCompound Inequalities.pdf
Compound Inequalities.pdf
 
Chapter 12 Bingo.pdf
Chapter 12 Bingo.pdfChapter 12 Bingo.pdf
Chapter 12 Bingo.pdf
 
Kiss the arse of stone
Kiss the arse of stone Kiss the arse of stone
Kiss the arse of stone
 
Lo4 evaluation
Lo4 evaluationLo4 evaluation
Lo4 evaluation
 
Solving Literal Equations.pdf
Solving Literal Equations.pdfSolving Literal Equations.pdf
Solving Literal Equations.pdf
 
OPT-MRP
OPT-MRPOPT-MRP
OPT-MRP
 
Trig Functions 2.pdf
Trig Functions 2.pdfTrig Functions 2.pdf
Trig Functions 2.pdf
 
Inspire Portfolio
Inspire PortfolioInspire Portfolio
Inspire Portfolio
 
12 1 tangent lines
12 1 tangent lines12 1 tangent lines
12 1 tangent lines
 
Transmedia Storytelling in Higher Education
Transmedia Storytelling in Higher EducationTransmedia Storytelling in Higher Education
Transmedia Storytelling in Higher Education
 
Early Sense
Early SenseEarly Sense
Early Sense
 
Tema 14 Origen y estructura de la tierra
Tema 14 Origen y estructura de la tierraTema 14 Origen y estructura de la tierra
Tema 14 Origen y estructura de la tierra
 

Similar to Trends_in_my_profession(revised)

ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdf
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdfHow Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdf
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdfAnudipF
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityIJICTJOURNAL
 
Required topic cyberlaw documentpresentation document .docx
Required topic  cyberlaw documentpresentation document .docxRequired topic  cyberlaw documentpresentation document .docx
Required topic cyberlaw documentpresentation document .docxheunice
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 

Similar to Trends_in_my_profession(revised) (20)

csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdf
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdfHow Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdf
How Cybersecurity Professionals Will Shape Tomorrow's Digital World.pdf
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Cyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network securityCyber attack awareness and prevention in network security
Cyber attack awareness and prevention in network security
 
Required topic cyberlaw documentpresentation document .docx
Required topic  cyberlaw documentpresentation document .docxRequired topic  cyberlaw documentpresentation document .docx
Required topic cyberlaw documentpresentation document .docx
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 

Trends_in_my_profession(revised)

  • 1. TRENDS IN MY PROFFESSION 1 Annotated Bibliography: Trends in my profession By Mantenso Samia Skido-Achulo 01/31/2016 The three trends I discoveredin my research were, 1) Cyber security goes mainstream 2) Social media hacking escalates 3) 2016 is a year of security training and certifications
  • 2. TRENDS IN MY PROFFESSION 2 Cyber security goes main stream Cyber security will go mainstream in 2016 so far as technology continues to evolve with time. “Cyber security has been an industry that has tremendously grown over the past few years due to technology. “This is another trend that we’ve watched grow over the past few years, but there’s no question that cybersecurity made it to the forefront of mainstream and even pop culture focus in 2015.” By Nate Lord Tuesday September 29, 2015 “This article published in 2015, talks about the ability of cyber security to go mainstream in the substituent years ahead.” IOS, android other networks and mainly organizations get attacked by hackers yearly and this year possess to be the same. For some time now cyber attackers have been coordinating and collaborating, trying out new tactics and tools, and generally trying to be smarter than cyber security industry. Due to the fact that the industry improving, we hope to see the promising solutions to this attacks this year.
  • 3. TRENDS IN MY PROFFESSION 3 Without cyber security our companies will not be protected, improving software’s will impossible and trying to stay ahead of the hackers is not likely. The rapid increase in technology and especially in social media , has kept cyber security in the spot light for protecting information leakage through their devices, more attention has been put on the industry because of the great help if offers. “The article focuses on information security issues. Topics include cybersecurity, denial of service (DOS) attack, and data protection.” Due to the fact that Organization and other business and private entities , store their confidential information on computers, laptops or any other device that makes it easier for hackers to invade . Cyber security serves a protective tool, which is needed, and all efforts to improve every aspect of cyber security is highly important to our nation and the world at large. To keep highly confidential information stored
  • 4. TRENDS IN MY PROFFESSION 4 Socialmedia hacking escalates . Social media hacking has been a problem, and will continue to be a disturbing issue, which unfortunately does not prove to be any different so far. Hack in a situation where a computer is trespassed by a person from a remote location .Vital information is retrieved from this devices which could lead to very consequences.In my in-depth research a book by Taylor & Francis says that ““In Western societies, the practice of computer hacking is increasingly being viewed as a major security dilemma by governments and security experts alike” A majority of Social Networks have a huge impact on our lives and to the world as well. Instagram, Facebook, Myspace, twitter Are driven by information technology and ever since these networks evolved they have attracted a numerous amount of users, unfortunately most of these followers are with the intention of hacking into people’s information
  • 5. TRENDS IN MY PROFFESSION 5 All humans are vulnerable to social media attacks, so far as they do patronize social media it is almost inevitable, some individuals are harder to trick than others but eventually a majority of people get caught in a hacker’s game. Social media is an amazing marketing tool for a lot of companies’ .They gets their companies more recognition but then again opens the space for hackers to thrive. This article says “security professionals are most concerned about targeted attacks, external hackers and insider threats, according to a recent report from Symantec. Their jobs are made more challenging by industry trends” The level of social media hacking will continue to escalate with time; this is because internet fraudsters tend to be one step ahead of their game when it comes to gaining information from organizations, individuals and companies. Making it very dangerous to trust confidential information on devices or mostly cloud storage.
  • 6. TRENDS IN MY PROFFESSION 6 2016 is a year of security training andcertifications An effort is been made, to address the increasing threats to the cyber security industry. Cybersecurity training courses and certifications are taking place. Skilled, accredited persons and industries have been opportunity to train people and award certificates to broaden their knowledge on the industry as to how attacks and be reduced and ways to go about them. According to Trim, .P.J. “This book will interest government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science”. Other ways of attracting spreading awareness is by writing books .Such books should consist of information such consequences of hacking, actions that need to be taken and ways of preventing them. This procedure of certification and training will gain more exposure to the industry and recruit more people in fighting hackers.
  • 7. TRENDS IN MY PROFFESSION 7 Based on the outstanding amount of cyber threats, training and certification is extremely necessary in this industry, certificates do not only prove that an individual has he qualifications, but also assures that the knowledge needed to gain experience as employee is valid .In out part of the world especially and considering our economic situation, training and certification is very important for building skills, improving career opportunities. “This article by McCrohan, K. F, presents the results of a study to determine the impact of a cyber threat education and awareness intervention on changes in user security behavior” Certifications and training is necessary at all times especially during the national cyber security and awareness month which is held in October every year. This is important to the country since cyber threats poses to be one of the dangers the country deals with and it will create jobs and carriers for the youth
  • 8. TRENDS IN MY PROFFESSION 8 References Everett, C. (2015). Feature: Big data – the future of cyber-security or its latest threat?. Computer Fraud & Security, 201514-17. doi:10.1016/S1361-3723(15)30085-3 Engel, K., & Harvey, J. W. (2010). Influence of Awareness and Training on Cyber Security. Journal Of Internet Commerce, 9(1), 23-41. doi:10.1080/15332861.2010.487415 Hackers Mobile Social Media Making IT Security A Challenge 223185. (2011). eWeek Lamont, J. (2015). Information security goes mainstream. KM World, 24(3), 6-7. Taylor, P. A. (1999). Preface. In , Hackers (p. 1). Ltd / Books. Trim, P. J. (2013). Cyber security culture: counteracting cyber threats through organizational learning and training.