This page contains a Flash digital edition of a book.
CAREER OUTLOOK


he proliferation of identity theft, activist hacking, online malicious denials of service, computer crooks pillaging private sector companies and a mix of criminal- and state-sponsored server penetration has made the cyber security sector a magnet for the appropriately-trained graduate.


Recruiting Trends T


Because beyond the previously listed problems, there is al- ways a need to stop hackers trying to disrupt and steal industrial and military data, plus attempts to turn command and control equipment in both arenas into remotely-controlled soft- and hardware.


Computer science, computer engineering and informa- tion technology majors of related academic flavors interested in cyber security careers must consider the list in a following paragraph as a guide to potential employers. Hackers armed with malware, viruses and worms are attacking each sector, and if you are adept in your major or advanced degree, you need to begin paying attention to those areas. Their problem is your fortune if prepare yourself properly. Who? Why? Read on. Pay attention. Those organizations need you, and hard work and success at blocking and defending against cyber criminals may someday place the title of chief digital officer or cloud security officer on your business card.


A 2012 study by KPMG study reported “that more than three-quarters of the Forbes [global] 2000 companies leak potentially dangerous material.” In descending order, the “Top 10 information leaking sectors” were:


by Frank McCoy fmccoy@ccgmag.com CYBER SECURITY SECTOR A MAGNET FOR APPROPRIATELY TRAINED GRADS


www.blackengineer.com


USBE&IT I WINTER 2012 65


BANKING 30 PERCENT


DIVERSIFIED FINANCIAL 12 PERCENT


MATERIALS 10 PERCENT


TELECOMMUNICATIONS SERVICES 8 PERCENT


UTILITIES 8 PERCENT


TECHNOLOGY HARDWARE AND EQUIPMENT 8 PERCENT


MEDIA 6 PERCENT


CONSTRUCTION 6 PERCENT


OIL AND GAS OPERATIONS 6 PERCENT


INSURANCE 6 PERCENT


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86