Category: 

What does a Computer Security Specialist do?

Article Details
  • Written By: Cassie L. Damewood
  • Edited By: Jenn Walker
  • Last Modified Date: 06 November 2016
  • Copyright Protected:
    2003-2016
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
The mongoose was introduced to Hawaii in order to kill rats, but mongooses hunt in the day, while rats are nocturnal.  more...

December 7 ,  1941 :  Japanese bombers attack Pearl Harbor.  more...

A computer security specialist, also known as an information security specialist, safeguards computer systems and protects them from a variety of threats. These risks may be of an internal or external nature. The specialist traditionally provides services to government agencies, educational organizations and small to large businesses.

Threats to computer systems and networks grow exponentially with technological advancements. Each forward step in the industry is normally followed by a new set of risks. This generally requires a computer security specialist to constantly upgrade his level of knowledge and increase his arsenal of combative tools, applications and systems.

One of the most basic security measures involves the control of passwords. If an organization's users are required by a computer security specialist to frequently change their passwords, this reduces the chances of unauthorized access to restricted or confidential programs, databases or networks. This practice, coupled with limited physical access to computers, provides basic internal security.

The most dangerous risks to computer security often come from outside sources. The specialist commonly installs firewalls to deter hackers. He also regularly installs programs that issue alerts when any attempt to infiltrate the system is made. Some highly sophisticated programs can trace the source of the hacker through identifying the Internet protocol address of the intruder.

Ad

If a virus infects a system or network, or a hacker successfully contaminates data, the specialist is commonly expected to have implemented measures to protect system information. This typically involves backing up all data to an external drive or third party location on an ongoing basis. The backups are usually automatically performed every few hours or at the end of each day.

To effectively secure and protect a company’s computer network, the computer security specialist is customarily required to clearly communicate policies and procedures to all staff employees and management. The security measures he implements will only be successful if the system’s users understand the importance of the security measures and follow protocol to keep them up-to-date and functional. If the specialist suspects internal breaches, he is generally required to report them to management.

A computer security specialist is frequently expected to submit reports to management on external hacking attempts and the possibilities of future threats to the integrity of the network. He ordinarily recommends upgrades to security software or firewalls. He may also suggest implementing additional access and password precautions to increase a company’s defenses against internal tampering.

A bachelor’s degree in computer technology is normally required to qualify for this position. Education and experience in computer programming or risk management are also considered good qualifications. Certificates specific to computer security are often offered at community colleges and technical institutes.

Ad

You might also Like

Recommended

Discuss this Article

barryherne
Post 1

Well, such specialists are in great demand among the companies because they are going to be responsible for the company's IT infrastructure security and for choosing the right tools to keep the whole system safe. Most of them at the moment choose a cloud-based tool like Anturis to save money for companies, since it doesn't require any hardware.

Post your comments

Post Anonymously

Login

username
password
forgot password?

Register

username
password
confirm
email