Daily Bulletin

Men's Weekly

.

  • Written by Joanne Hall, Lecturer in Mathematics and Cybersecurity, RMIT University
What skills does a cybersecurity professional need?

Cyber crime is a threat to every organisation that operates internet-connected devices. It’s highly profitable, highly disruptive, and hard to police due to the transnational nature of cyberspace.

Incidences of cyber crime might include fraud, identity theft or privacy breaches, which can have a high personal impact. Ransomware, which locks a system and demands payment, can have widespread economic or healthcare implications.

In the past year, 25% of the Australian adult population was impacted by cyber crime. If we want a robust and resilient society, we need cybersecurity professionals defending every organisation from cyber attack.

Cybersecurity professionals might work in software development, network testing, incident response, or policy development to ensure the security of an organisation. Nisman Solutions, a software development company that knows the impact a bad security system can bring, makes sure their developers are skilled in cyber security to ensure all applications they develop are safe to use.

In popular culture, these experts are often portrayed as lone hackers in hoodies. But in reality, cybersecurity professionals must regularly communicate with a variety of audiences. They must also display a high degree of personal integrity.

Read more: What teenagers need to know about cybersecurity

What cybersecurity professionals do

To ensure our cybersecurity classes are teaching skills relevant to industry, we consult with security professionals about the skills they are looking for.

As well as technical skills, they tell us they want those they hire to have communication skills, work well in teams, and show empathy and integrity.

The following scenarios show what cybersecurity professionals do on a daily basis. (Names and details have been changed.)

Ensuring systems are compliant

Anna is a software developer for an online retailer. She notices that one of their systems is processing credit card transactions in a way that does not comply with the Payment Card Industry Standards.

The technical project leader does not understand the legal jargon of the PCI standard. The business and legal staff do not understand the software processes behind credit card transactions.

It’s Anna’s job to bring together technical, legal, and business operations staff to discuss the resources required to fix this problem.

Identifying vulnerabilities

Basim is a security specialist working for a consulting company. His team has been contracted by a superannuation fund to conduct a simulated attack on the fund’s network.

Basim’s team grabs a round of coffees and sits around the whiteboard to develop a plan. That afternoon they find a way to change the password of every customer, using a commonly known vulnerability.

Basim immediately calls the super fund to notify them of the dangerous vulnerability. He then spends the rest of the afternoon working with the super fund’s IT team to begin to fix the issue.

The team continues with the simulated attack for three more days and finds a few (less urgent) vulnerabilities. The team collates the attack notes and writes a comprehensive report. The next day Basim hands over the report and delivers a presentation to key members of the super fund.

Read more: Some cybersecurity apps could be worse for privacy than nothing at all

Monitoring and responding to attacks

Chiyo works in the Security Operations Centre of a university. Her team has set up monitoring systems that alert them to any malicious software (malware) on the university network.

The monitoring system alerts her to some unusual activity with a staff email account, and automatically disables that account. She investigates and finds that a staff member has opened an email attachment containing malware.

Chiyo calls the staff member to notify them that their account has been disabled and discusses the process to regain access. A member of Chiyo’s team configures the email filter and firewall to block the source of malware.

Meanwhile Chiyo walks over to the staff member’s office and erases all data on the infected computer. She then works with the staff member to reinstate the email account, set up software, and retrieve documents from backup storage.

Preventing data breaches

Dimitry works in the cyber security team for a government department. His team is asked to analyse the policies, procedures, and structures of the department to look for risks to citizens’ privacy. He discusses the current laws and best practices with a colleague from the Office of the Australian Information Commissioner.

Dimitry’s team identifies five processes where there is a high risk for personal data to be leaked. They analyse each process, determine the likelihood of each type of problem, and examine the possible outcomes of each risk scenario. Dimitry develops a plan and budget to reduce each of the risks. He presents a report to the Minister and the Department Secretary.

The Department Secretary determines that there is a strong case to implement the plan for two of the risky procedures immediately. The other three risky procedures are deemed low-priority, and will be re-examined in six months’ time. Dimitry sets up a team to implement the remediation plan.

Read more: It's time for governments to help their citizens deal with cybersecurity

Integrity and communications skills are essential

These scenarios highlight that, in addition to their technical skills, cybersecurity professionals need to work in teams and communicate with a variety of people.

In each case, the security professional had access to information that could easily be sold on the black market, or exploited for personal gain. Anna could have stolen credit card details. Basim’s team knew about some vulnerabilities three days before they informed the super fund. Chiyo had access to a staff member’s entire email history. Dimitry knows about three vulnerable processes that will not be changed for six months.

Personal integrity is crucial to maintain the security of these highly sensitive systems.

Communication with non-technical staff is essential to ensuring that best practice is implemented across an organisation. A strong ethical framework is an absolute necessity for security staff. The best technical staff will only build a safer organisation if their communication skills are strong and their personal integrity is unwavering.

Authors: Joanne Hall, Lecturer in Mathematics and Cybersecurity, RMIT University

Read more http://theconversation.com/what-skills-does-a-cybersecurity-professional-need-106521

Business News

Robot Trading and Automation: Does Automated Trading Really Work?

In today’s fast-moving financial markets, many new and experienced traders wonder whether automated trading systems — often called trading robots, expert advisors (EAs), or algorithmic bots — can real...

Daily Bulletin - avatar Daily Bulletin

Physical retail roars back: Christmas 2025 expected to be the biggest in years

Physical retail is back and it’s booming. Shopping centres across Australia are preparing for one of the biggest Christmas and Boxing Day sale seasons on record, driven by strong consumer confidence...

Daily Bulletin - avatar Daily Bulletin

Groundbreaking investment positions Agile Energy to slash power costs for Australian businesses and accelerate Australia’s rise as a green economic powerhouse

Agile Energy is now positioned to play a defining role in reducing energy costs for Australian businesses and fast-tracking the nation’s transformation into a globally competitive green economic pow...

Daily Bulletin - avatar Daily Bulletin

Speed Dating For Business
hacklink hack forum hacklink film izle hacklink หวยออนไลน์kavbetสล็อตเว็บตรงgamdom girişpadişahbetMostbetpradabetkavbetcarros usadospin updizipalStreameastholiganbettrendbetcocktail glassessetrabetjojobetDeneme Bonusu Veren Sitelerpusulabet girişbetnanotürk ifşaBets10jojobetjojobetjojobetMavibet色情casibomnakitbahisholiganbetPusulabet girişpusulabet girişholiganbet girişyakabet1xbet girişjojobetgrandpashabetbetofficeenjoybetpradabetkingroyalholiganbetgiftcardmall/mygiftultrabetmatbetfixbetbets10royalbetmeritkingcasibommeritkingcasibomcasibommeritkingcasibom girişJojobettaraftariummadridbetPorno İzlecasibom girişkolaybetjustintvgalabetcasibomcasibom girişjokerbetjokerbetyakabetCasibombetpuantrgoalsartemisbet girişdinamobetbetnanovdcasinoSekabet girişmarsbahisbetkolikultrabetprimebahisselçuksportsprimebahistaraftarium24betcioyakabetyakabetyakabetjojobetkulisbetbetnanoSahabetaertyercasibomcolor pickermavibetvbetcolor pickerkavbetkralbet girişmavibetmavibetmavibetmavibetcratosslot girişคลิปหลุดไทยCasibomCasibomholiganbetdeneme bonusu veren siteleronwinonwinizmir escortholiganbetantalya escortbetnano girişjojobet girişmarsbahisbahsegeltimebetbetnanocasibom güncel girişcasibom girişbahiscasinojojobetbets10matbetjojobetRoyal Reelsroyal reelskolaybetKayseri Escortjojobet girişjojobetgrandpashabet girişNişantaşı EscortelexbetelexbetbettiltStreameastcasibom güncel girişKalebetpadişahbetfixbetaviator gamesetrabettimebettimebettimebetbahisoistanbul escort telegramcasibombetparkcasibomcrown155hb88super96holiganbetcasibomstreameast한국야동av한글자막jojobet girişสล็อตpornopadişahbetBetigmabetparkBetigmaBetlora girişgiftcardmall/mygiftgaziantep escortspin2uneoaus96padişahbetholiganbetmarsbahisxslotcasibombets10ffpokiesjojobetbest australia online casino 2026best payid casino australiaholiganbetjojobetdeneme bonusu veren siteler rehnerijojobetmostbetdaftar situs judi slot gacor hb88 indonesiaJojobet 1112mostbetmostbetkingroyalorisbetbahis siteleri 2025matadorbetMalware downloadcasinowon girişmatbetjojobetwww.giftcardmall.com/mygiftmarsbahisgrandpashabetcasibomcasibomgiftcardmall/mygiftasdsadasdasdasdasfdasfasfsadfasdfsdfasdasdasdasdkingroyal girişjojobetbahiscasinograndpashabet girişpin up uzbekistanSlot Heart Casinocasinomedklarna.seholiganbetcasibomwww.mcgift.giftcardmall.com balancewww.mcgift.giftcardmall.com balancegiftcardmall/mygiftwww.giftcardmall.com/mygift activatetm menards loginsweet bonanzabetasusroyalbetjojobetstake payid casino australiabest payid casino in australiajojobetcanlı maç izleklasbahishttps://vozolturkiyedistributoru.com/casibomcasibomcratosroyalbetci girişjojobet girişcasibomwolf winnerWolf Winnercasibomdeneme bonusu veren sitelerjokerbetjojobetjojobetrokubetmeritkingssitus slot gacorJojobetjojobetcasibom