Google search

Search IT Security Blog:


Monday, July 20, 2009

Introduction

Security in Information Technology is a very important issue. It is an area that deserves study by computer professionals, students, and even many computer users. Through this course, student will learn how to control failures of confidentiality, integrity and availability in applications,databases, operating systems and networks alike. Beside that students should be able to implement the cyberlaw to protect their rights. Students also will learn on how to plan the recovery solution if any disaster happens to the computing environment.

Over the past two decades, the evolution of technology has quickened society’s transformation to a digital environment. These advances have been nonlinear and sometimes chaotic leading to disparities in the composition of the information technology (IT) workforce. The variation in training, expertise, acumen, and experience is a natural consequence and is found in the myriad of recruiting, education, and retention practices of employers. Since the very beginning of the digital revolution, public and private organizations, leaders, and experts have dedicated significant resources to developing the IT security field of practice, yet disparities remain.

Now more than ever, IT securities professionals must be prepared to meet the challenges that exist today and in the future. The convergence of voice and data communications systems, the reliance of organizations on those systems, and the emerging threat of sophisticated adversaries and criminals seeking to compromise those systems underscore the need for well trained, well equipped IT security specialists. Furthermore, the interconnectedness of government and industry through shared infrastructures and services demonstrates the need for a universal understanding across domains of the required roles, responsibilities, and competencies of the IT security workforce.

No comments:

Post a Comment