SlideShare a Scribd company logo
1 of 4
Download to read offline
Cyber security for Developers – How to learn
cyber security
Cyber security for Developers – How to learn cyber security
Over the past years, the demand for cybersecurity professionals has increased. As listed by the (BLS)
Bureau of Labor Statistics U.S., it is expected that it will rise to 28% in the future. Before getting into the
importance of Cyber security for developers, we must know what is Cyber security and its need in
today’s technologically advanced age.
What Do Cyber security professionals Do?
Cybersecurity professionals provide security to data centers, software systems, and networks during the
development stages. Their job is to search for the vulnerabilities and risks in the hardware and software of
the system.
Cybersecurity specialists monitor and manage illegal intrusions and attacks. They can recognize the
potential threats and breach attempts by shutting off the security vulnerability. These professionals develop
new layers of protection in the form of security system updates.
These professionals make strategies and design various defensive systems against the intruders. The
experts create protocols and defensive schemes and report incidents as well as grant privileges and
permission to authorized users.
In addition to that, it’s the responsibility of cybersecurity professionals to examine the defensive system
continuously and give conclusions based on the test results. They verify the undetected breaches by
running the diagnostics if any change happens. This shows how important is Cyber security for
developers in this age.
History of Cyber security
People usually assume that the computer virus came after the invention of computer networks. But that is
not true. In 1949, a mathematician named John Von Neumann was the first to conceptualize this idea in his
paper.
John gave the self-replicating concept of an automatic entity working within the computer that can harm
the system. 1971 was a time when the internet was in its earliest form. At that time, some network users
were surprised to see the message displaying on their screens “I’m the creeper, catch me if you can.”
Users had no idea at that point about it. Creeper was a kind of worm or computer virus that duplicates itself
and then spreads over the other systems. It was created by Newman, Beranek, and Bold.
Robert Morris, in 1988 had an idea. He wanted to measure internet size. For this, he designed a program
known as a bug that propagates across the networks, infiltrate UNIX terminal, and then replicate itself. The
replication instruction was a mistake because Morris worm copied too aggressively and caused so much
damage due to the slow crawling of the internet. He was then charged under the Computer Fraud and
Abuse Act. But Morris worm was the start of something.
Secure Socket Layer (SSL) is an internet security protocol that was designed for using the internet safely,
such as an online purchase. Netscape launched SSL 2.0 in February 1995, which later become the critical
language for using the web securely, HyperText Transfer Protocol Secure (HTTPS). However, it was not
enough for the conditions to come.
Anonymous was the first-ever hacking group prominently known in 2003. They committed cyber attacks
that were generally considered harmful against different organizations such as the church of Scientology.
The hackers were identified by their Guy Fawkes masks.
Security breaches were highly unusual before 2010. Google, on Jan. 12, shocked the world by announcing
‘Operation Aurora’ which was a major security breach on its infrastructure in China. The attack hit over 50
companies in technology, chemical sector, finance, internet, and media.
Initially, it was thought that the attempt was to access Google accounts for Chinese human rights activists.
However, analysts discovered that it was to identify the Chinese operatives in the U.S. who were at the
watch list of American Law Enforcement Agencies.
In simple words, with the boom of the internet in the late 90s, excessive use in the 2000s, and increasing
malware and viruses’ attacks and threats, Cybersecurity become an essential part of the IT course.
Benefits of learning Cyber security for Developers
Why should developers learn Cybersecurity? Well, the simple answer is benefits. Below are the primary
factors that have made the career of Cybersecurity a brilliant choice for many:
 -Evergreen industry:Cybersecurity is transformed into an evergreen field as cyber attacks are
the by-products of today’s digital revolution. With the advancements in technology, the
magnitude of the importance of Cybersecurity is very well set in stone as every industry and
business needs cybersecurity professionals.

 -Choose the industry you like:With the advancements in IoT, Cloud Computing, Automation,
and Big Data, we can see the digital revolution in various sectors. Thus, being a cybersecurity
professional, you can work in schools, hospitals, top-secret military, and government agencies.

 -Huge potential for personal growth:Day by day, the cyber attacks are becoming smarter.
Cybersecurity experts are seen busy in analyzing the risks and threats for organizations,
patching the vulnerabilities, outsmarting the black hat hackers. Tackling such tasks can be done
with thorough research and continuous study. This means that while working in Cybersecurity,
knowledge level rises with experience.

 -Hefty paychecks: Almost every week, we read or hear the stories of cyber attacks. Now
businesses and government agencies are looking for cybersecurity experts to protect their
network and systems from cyber criminals. Also, they are providing training and paying high
salaries to their employees. Their salaries are based on merit and not on ethnicity, age, or sex.
Cybersecurity salaries have higher growth potential as compared to other sectors.

 -Work with top companies:Cybersecurity professionals can get a chance to work with 500
prestigious companies such as Dell, InfoTech, Accenture, etc., other than these, top-secret
government and intelligence industries also higher cybersecurity experts.
How to Become a Cyber security Professional?
The cybersecurity specialists must recognize the security gaps, maintain documentation on IT security
controls, and prepare the action plans accordingly. They have to work with different organizations and
stakeholders related to cybersecurity matters.
They are responsible for creating and suggesting recommendations about security policies and ensure the
implementation and mitigation with support during the execution of those plans. The common
cybersecurity operations include process re-engineering, automation, and documentation.
To become a cybersecurity expert, you need to learn computer expertise and get cybersecurity
qualifications. Depending on the job designation and responsibilities, you need specialized certificates to
fulfill the job criteria.
 Bachelor’s degree: A mandatory requirement to get a leadership position is getting a degree.
Higher job prospects come with more education. It’s better to get a bachelor’s degree first to
become a cybersecurity professional and work on the technical front.
 Cybersecurity certifications: Transmitting into a new field and get to know the latest
advancements, certifications play an important role. Cybersecurity is a field, which is continually
evolving.
Companies hire cybersecurity candidates who are ready to take jobs without additional skill-update and
training. Certifications are the quickest as well as the easiest way to acquire the required skills to get the
job. Below are some certifications that you might need:
 – Cisco Certified Network Associate (CCNA)
 – Foundation Certificate in Cyber Security
 – CEH (Certified Ethical Hacker)
 – GSEC / GCIH / GCIA: GIAC Security Certifications
 – CompTIA Security+ Systems
 – Security Certified Practitioner (SSCP)
 – Certified Information Systems Auditor (CISA)
 – Certified Information Systems Security Professional (CISSP)
 – Certified Information Systems Manager (CISM)
3. Learn skills:Every field requires some skills to make yourself well-versed with the fundamentals
for Cybersecurity; you need to learn the following skills.
 * Ethical hacking, secure coding practices, and threat modeling
 * Windows, UNIX and Linux operating systems
 * DLP, Anti-virus, and anti-malware
 * ITIL, COBIT, and ISO 27001/27002 frameworks
 * Security Information and Event Management (SIEM)
 * NIST, GLBA, PCI, HIPAA, and SOX compliance assessments
 * Penetration, vulnerability and IDS/IPS testing
 * Computer networking, routing, switching, and TCP/IP
 * Intrusion detection/prevention and firewall protocol
 * Java, PHP, C++, C#, or C programming languages
4. Organizational skills: Apart from getting the right credentials, one should have the following
skills to be a cybersecurity professional:
– Excellent written and verbal communication skills
– Analytical thinker
– Problem-solving ability
– Experience in different security specializations
– Management and leadership skills
– Ability to work in a fast-paced environment
– Flexibility to multi-task

More Related Content

Similar to Cyber security for Developers

What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)Wail Hassan
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber securityVishal Singh
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxNarangYadav
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSSprintzeal
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.The Whole World News
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 

Similar to Cyber security for Developers (20)

Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Module 1 (legality)
Module 1 (legality)Module 1 (legality)
Module 1 (legality)
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Forensics
ForensicsForensics
Forensics
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 

Cyber security for Developers

  • 1. Cyber security for Developers – How to learn cyber security Cyber security for Developers – How to learn cyber security Over the past years, the demand for cybersecurity professionals has increased. As listed by the (BLS) Bureau of Labor Statistics U.S., it is expected that it will rise to 28% in the future. Before getting into the importance of Cyber security for developers, we must know what is Cyber security and its need in today’s technologically advanced age. What Do Cyber security professionals Do? Cybersecurity professionals provide security to data centers, software systems, and networks during the development stages. Their job is to search for the vulnerabilities and risks in the hardware and software of the system. Cybersecurity specialists monitor and manage illegal intrusions and attacks. They can recognize the potential threats and breach attempts by shutting off the security vulnerability. These professionals develop new layers of protection in the form of security system updates. These professionals make strategies and design various defensive systems against the intruders. The experts create protocols and defensive schemes and report incidents as well as grant privileges and permission to authorized users. In addition to that, it’s the responsibility of cybersecurity professionals to examine the defensive system continuously and give conclusions based on the test results. They verify the undetected breaches by running the diagnostics if any change happens. This shows how important is Cyber security for developers in this age. History of Cyber security People usually assume that the computer virus came after the invention of computer networks. But that is not true. In 1949, a mathematician named John Von Neumann was the first to conceptualize this idea in his paper. John gave the self-replicating concept of an automatic entity working within the computer that can harm the system. 1971 was a time when the internet was in its earliest form. At that time, some network users were surprised to see the message displaying on their screens “I’m the creeper, catch me if you can.”
  • 2. Users had no idea at that point about it. Creeper was a kind of worm or computer virus that duplicates itself and then spreads over the other systems. It was created by Newman, Beranek, and Bold. Robert Morris, in 1988 had an idea. He wanted to measure internet size. For this, he designed a program known as a bug that propagates across the networks, infiltrate UNIX terminal, and then replicate itself. The replication instruction was a mistake because Morris worm copied too aggressively and caused so much damage due to the slow crawling of the internet. He was then charged under the Computer Fraud and Abuse Act. But Morris worm was the start of something. Secure Socket Layer (SSL) is an internet security protocol that was designed for using the internet safely, such as an online purchase. Netscape launched SSL 2.0 in February 1995, which later become the critical language for using the web securely, HyperText Transfer Protocol Secure (HTTPS). However, it was not enough for the conditions to come. Anonymous was the first-ever hacking group prominently known in 2003. They committed cyber attacks that were generally considered harmful against different organizations such as the church of Scientology. The hackers were identified by their Guy Fawkes masks. Security breaches were highly unusual before 2010. Google, on Jan. 12, shocked the world by announcing ‘Operation Aurora’ which was a major security breach on its infrastructure in China. The attack hit over 50 companies in technology, chemical sector, finance, internet, and media. Initially, it was thought that the attempt was to access Google accounts for Chinese human rights activists. However, analysts discovered that it was to identify the Chinese operatives in the U.S. who were at the watch list of American Law Enforcement Agencies. In simple words, with the boom of the internet in the late 90s, excessive use in the 2000s, and increasing malware and viruses’ attacks and threats, Cybersecurity become an essential part of the IT course. Benefits of learning Cyber security for Developers Why should developers learn Cybersecurity? Well, the simple answer is benefits. Below are the primary factors that have made the career of Cybersecurity a brilliant choice for many:  -Evergreen industry:Cybersecurity is transformed into an evergreen field as cyber attacks are the by-products of today’s digital revolution. With the advancements in technology, the magnitude of the importance of Cybersecurity is very well set in stone as every industry and business needs cybersecurity professionals.   -Choose the industry you like:With the advancements in IoT, Cloud Computing, Automation, and Big Data, we can see the digital revolution in various sectors. Thus, being a cybersecurity professional, you can work in schools, hospitals, top-secret military, and government agencies.   -Huge potential for personal growth:Day by day, the cyber attacks are becoming smarter. Cybersecurity experts are seen busy in analyzing the risks and threats for organizations, patching the vulnerabilities, outsmarting the black hat hackers. Tackling such tasks can be done with thorough research and continuous study. This means that while working in Cybersecurity, knowledge level rises with experience.   -Hefty paychecks: Almost every week, we read or hear the stories of cyber attacks. Now businesses and government agencies are looking for cybersecurity experts to protect their network and systems from cyber criminals. Also, they are providing training and paying high
  • 3. salaries to their employees. Their salaries are based on merit and not on ethnicity, age, or sex. Cybersecurity salaries have higher growth potential as compared to other sectors.   -Work with top companies:Cybersecurity professionals can get a chance to work with 500 prestigious companies such as Dell, InfoTech, Accenture, etc., other than these, top-secret government and intelligence industries also higher cybersecurity experts. How to Become a Cyber security Professional? The cybersecurity specialists must recognize the security gaps, maintain documentation on IT security controls, and prepare the action plans accordingly. They have to work with different organizations and stakeholders related to cybersecurity matters. They are responsible for creating and suggesting recommendations about security policies and ensure the implementation and mitigation with support during the execution of those plans. The common cybersecurity operations include process re-engineering, automation, and documentation. To become a cybersecurity expert, you need to learn computer expertise and get cybersecurity qualifications. Depending on the job designation and responsibilities, you need specialized certificates to fulfill the job criteria.  Bachelor’s degree: A mandatory requirement to get a leadership position is getting a degree. Higher job prospects come with more education. It’s better to get a bachelor’s degree first to become a cybersecurity professional and work on the technical front.  Cybersecurity certifications: Transmitting into a new field and get to know the latest advancements, certifications play an important role. Cybersecurity is a field, which is continually evolving. Companies hire cybersecurity candidates who are ready to take jobs without additional skill-update and training. Certifications are the quickest as well as the easiest way to acquire the required skills to get the job. Below are some certifications that you might need:  – Cisco Certified Network Associate (CCNA)  – Foundation Certificate in Cyber Security  – CEH (Certified Ethical Hacker)  – GSEC / GCIH / GCIA: GIAC Security Certifications  – CompTIA Security+ Systems  – Security Certified Practitioner (SSCP)  – Certified Information Systems Auditor (CISA)  – Certified Information Systems Security Professional (CISSP)  – Certified Information Systems Manager (CISM) 3. Learn skills:Every field requires some skills to make yourself well-versed with the fundamentals for Cybersecurity; you need to learn the following skills.  * Ethical hacking, secure coding practices, and threat modeling  * Windows, UNIX and Linux operating systems  * DLP, Anti-virus, and anti-malware  * ITIL, COBIT, and ISO 27001/27002 frameworks  * Security Information and Event Management (SIEM)  * NIST, GLBA, PCI, HIPAA, and SOX compliance assessments  * Penetration, vulnerability and IDS/IPS testing  * Computer networking, routing, switching, and TCP/IP  * Intrusion detection/prevention and firewall protocol
  • 4.  * Java, PHP, C++, C#, or C programming languages 4. Organizational skills: Apart from getting the right credentials, one should have the following skills to be a cybersecurity professional: – Excellent written and verbal communication skills – Analytical thinker – Problem-solving ability – Experience in different security specializations – Management and leadership skills – Ability to work in a fast-paced environment – Flexibility to multi-task