{"id":2980,"date":"2023-03-24T08:53:17","date_gmt":"2023-03-24T01:53:17","guid":{"rendered":"https:\/\/international.binus.ac.id\/computer-science\/?p=2980"},"modified":"2024-05-29T12:25:47","modified_gmt":"2024-05-29T05:25:47","slug":"what-is-cyber-security","status":"publish","type":"post","link":"https:\/\/international.binus.ac.id\/computer-science\/2023\/03\/24\/what-is-cyber-security\/","title":{"rendered":"What is Cyber Security?"},"content":{"rendered":"<p><span lang=\"EN\" data-contrast=\"auto\">Cyber security secures computers, servers, mobile devices, electronic systems, networks, and data against malicious attacks. Alternatively, it&#8217;s called\u00a0<a href=\"https:\/\/www.knowledgehut.com\/blog\/others\/what-is-information-technology\">information technology\u00a0<\/a>security or electronic information security. As per the use, there are several cyber security measures. Some of them are:<\/span><\/p>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Network security<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Application security<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Information security<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Operational security<\/span><\/li>\n<\/ul>\n<div class=\"next-image-styles\"><img decoding=\"async\" class=\"fr-fic fr-dib\" src=\"https:\/\/www.knowledgehut.com\/_next\/image?url=https%3A%2F%2Fd2o2utebsixu4k.cloudfront.net%2Fmedia%2Fimages%2F1668444790586-cyber-security-demand.png&amp;w=3840&amp;q=75\" alt=\"Demand for cyber security jobs\" data-nimg=\"responsive\" \/><\/div>\n<h2 id=\"need-for-cyber-security\"><span lang=\"EN\" data-contrast=\"auto\"><span data-ccp-parastyle=\"heading 2\">Need\u00a0<\/span><span data-ccp-parastyle=\"heading 2\">f<\/span><span data-ccp-parastyle=\"heading 2\">or Cyber Security<\/span>\u00a0<\/span><\/h2>\n<p><span lang=\"EN\" data-contrast=\"auto\">With the increase in\u00a0cybercrimes, the threat of information theft is also rapidly growing. Exposing identity information to the web via cloud services is the main reason for initiating cybercrimes. The methods by which cybercriminals attack different security systems are becoming more sophisticated, as well as the targets and methods they use to attack them. This hampers the stored data and causes economic, reputational and regulatory loss.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><span lang=\"EN\" data-contrast=\"auto\">To maintain the desired security posture, IT professionals and organizations must make fundamental changes in their approach to cyber security to keep up with the increasing prevalence and intensity of cyber threats. That&#8217;s why we need cyber security to check the enormous growth of the risk of cyber-attacks.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h2 id=\"why-is-cyber-security-in-demand\"><span lang=\"EN\" data-contrast=\"auto\"><span data-ccp-parastyle=\"heading 2\">Why\u00a0<\/span><span data-ccp-parastyle=\"heading 2\">i<\/span><span data-ccp-parastyle=\"heading 2\">s Cyber Security\u00a0<\/span><span data-ccp-parastyle=\"heading 2\">i<\/span><span data-ccp-parastyle=\"heading 2\">n Demand?<\/span>\u00a0<\/span><\/h2>\n<p><span lang=\"EN\" data-contrast=\"auto\">As day-to-day cyber-crimes are increasing, it always puts cyber security in a demanding state. If you see the past reports, every year, many private or government organizations are affected by cyber-attacks and data breaches.\u00a0<\/span><\/p>\n<p><span lang=\"EN\" data-contrast=\"auto\">The most recent case happened in 2020 when\u00a0<\/span><a href=\"https:\/\/www.who.int\/news\/item\/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance\" target=\"_blank\" rel=\"nofollow noopener\"><span lang=\"EN\" data-contrast=\"none\">WHO reported<\/span><\/a><span lang=\"EN\" data-contrast=\"auto\">\u00a0a statement that said 450 active email addresses and passwords of its staff leaked online to those working on the coronavirus.<\/span><\/p>\n<p><span lang=\"EN\" data-contrast=\"auto\">Due to factors like the distributed nature of the internet, increased profitability and ease of commerce on the dark web, proliferation of mobile devices, etc., cybercrime is on the rise. That&#8217;s why cyber security is in demand today to protect confidential data from getting leaked. And this demanding situation gives rise to the\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">cyber security job demand. G<\/span><span lang=\"EN\" data-contrast=\"auto\">et yourself enrolled in\u00a0<\/span><a href=\"https:\/\/www.knowledgehut.com\/cyber-security-courses\" target=\"_blank\" rel=\"noreferrer noopener\"><span lang=\"EN\" data-contrast=\"none\">Cyber Security certifications<\/span><\/a><span lang=\"EN\" data-contrast=\"auto\">\u00a0to increase the chance of hiring.<\/span><\/p>\n<h2 id=\"most-in-demand-cybersecurity-skills-to-learn-in-2022\"><span lang=\"EN\" data-contrast=\"auto\"><span data-ccp-parastyle=\"heading 2\">Most In-Demand Cybersecurity Skills to Learn in 2023<\/span><\/span><\/h2>\n<p><span lang=\"EN\" data-contrast=\"auto\">As cyber security increases its demand, people are getting the opportunity to explore cyber security&#8217;s future scope. You just need to accumulate the\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">most in-demand cyber security skills to fulfill the cyber security demand in 2023.<\/span><span lang=\"EN\" data-contrast=\"auto\">\u00a0Here are some top cyber security skills you should learn!\u00a0<\/span><\/p>\n<h3><span lang=\"EN\" data-contrast=\"auto\">1.\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">Understanding of Hacking<\/span><\/h3>\n<p><span lang=\"EN\" data-contrast=\"auto\">You must know how to hack ethically to safeguard your association from\u00a0cyber-attacks. Developing this skill is the first step in understanding a system attack and finding an effective solution.<\/span><\/p>\n<p><span lang=\"EN\" data-contrast=\"auto\">You may prefer some popular and\u00a0<\/span><a href=\"https:\/\/www.knowledgehut.com\/it-security\/ceh-ethical-hacking-certification-course\" target=\"_blank\" rel=\"noreferrer noopener\"><span lang=\"EN\" data-contrast=\"none\">top Ethical Hacking certifications<\/span><\/a><span lang=\"EN\" data-contrast=\"auto\">\u00a0to learn from basic to advance.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559731&quot;:0}\">\u00a0<\/span><\/p>\n<h3><span lang=\"EN\" data-contrast=\"auto\">2.\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">Cloud Security<\/span><\/h3>\n<p><span lang=\"EN\" data-contrast=\"auto\">Organizations are storing their data in the cloud to prevent future loss, but it is also essential to keep it safe and secure from cyber-attacks. And to protect those data, organizations need professional security managed by cloud security.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559731&quot;:0}\">\u00a0<\/span><\/p>\n<h3><span lang=\"EN\" data-contrast=\"auto\">3.\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">Computer Forensics Skills<\/span><\/h3>\n<p><span lang=\"EN\" data-contrast=\"auto\">To promote the information, computer forensics and cybersecurity usually work hand-in-hand. If you are skilled with a foundation in computer forensics, it will also help you to advance in your cyber security career. For the prevention of attacks and finding solutions, computer forensics and cyber security skills are the digital assets and intelligence. Hence, both skills are complementary to each other.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559731&quot;:0}\">\u00a0<\/span><\/p>\n<h3><span lang=\"EN\" data-contrast=\"auto\">4.\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">Blockchain Security<\/span><\/h3>\n<p><span lang=\"EN\" data-contrast=\"auto\">Various security systems, including mobile and IoT devices, supply chain integration, network control, and identity solutions, are likely to be built on blockchain technology. Since an attacker would have to destroy every computer in the global network to destroy or corrupt a blockchain, it offers unprecedented data security. Due to the complexity of entering and penetrating such networks, blockchain security is at a lower risk of getting hacked.<\/span><\/p>\n<h3><span lang=\"EN\" data-contrast=\"auto\">5.<\/span><span lang=\"EN\" data-contrast=\"auto\">\u00a0Artificial Intelligence (AI)<\/span><\/h3>\n<p><span lang=\"EN\" data-contrast=\"auto\">Artificial intelligence is one of the most advanced security programs which help security experts and professionals to understand the cyber environment and identify abnormal activities. It provides support to cyber threats and automated techniques. With additional resources, it defends the systems from cyber attackers&#8217; vulnerable networks and data.\u00a0<\/span><\/p>\n<h3><span lang=\"EN\" data-contrast=\"auto\">6.\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">Programming Skills<\/span><\/h3>\n<p><span lang=\"EN\" data-contrast=\"auto\">For any cyber security professional, understanding the programming language is very crucial. With the knowledge of languages such as Java, PHP, C, C++, etc., they can easily detect the chances of attacks and counteract the attackers accordingly.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559731&quot;:0}\">\u00a0<\/span><\/p>\n<h3><span lang=\"EN\" data-contrast=\"auto\">7.<\/span><span lang=\"EN\" data-contrast=\"auto\">\u00a0IoT Security<\/span><\/h3>\n<p><span lang=\"EN\" data-contrast=\"auto\">Connected devices and networks on the internet are protected by IoT security. This skill is required to explore the security and privacy-related problems in the IoT domain.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559731&quot;:0}\">\u00a0<\/span><\/p>\n<h3><span lang=\"EN\" data-contrast=\"auto\"><strong>8.\u00a0<\/strong>\u00a0<\/span><strong><span lang=\"EN\" data-contrast=\"auto\">Communication Skills<\/span><\/strong><\/h3>\n<p><span lang=\"EN\" data-contrast=\"auto\">To explain the issues, concerns and solutions to others, it is very important to have\u00a0<a href=\"https:\/\/www.knowledgehut.com\/blog\/project-management\/effective-communication\">effective communication<\/a>\u00a0skills because, as a cyber expert, you must deal with different teams and departments. Therefore, you should learn the skill to convey the most technical information in a comprehensible manner at different levels and individuals.\u00a0<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559731&quot;:0}\">\u00a0<\/span><\/p>\n<h3><span lang=\"EN\" data-contrast=\"auto\">9.\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">Problem-Solving Skills<\/span><\/h3>\n<p><span lang=\"EN\" data-contrast=\"auto\">Being a cyber security expert, you might be surrounded by problems at any time. Thus, always having a problem-solving approach can lead you to find extraordinary ways to solve the most complex security challenges.<\/span><\/p>\n<h2 id=\"how-to-build-cyber-security-skills\"><span lang=\"EN\" data-contrast=\"auto\"><span data-ccp-parastyle=\"heading 2\">How\u00a0<\/span><span data-ccp-parastyle=\"heading 2\">t<\/span><span data-ccp-parastyle=\"heading 2\">o Build Cyber Security Skills?<\/span>\u00a0<\/span><\/h2>\n<p><span lang=\"EN\" data-contrast=\"auto\">To meet the\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">cyber security demand<\/span><span lang=\"EN\" data-contrast=\"auto\">\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">and begin the cyber security journey, skills are the basic foundation.\u00a0<a href=\"https:\/\/www.knowledgehut.com\/blog\/others\/best-online-courses\">Online courses<\/a>\u00a0are anyway good to go, as they will teach you from the basic to the advanced level of cyber security concepts. It will help you to enhance your cyber security skills, including other related technical skills. However, the field of cyber security is incredibly complex and rapidly expanding, and the\u00a0<a href=\"https:\/\/www.knowledgehut.com\/blog\/security\/cyber-security-jobs\">future of cyber security jobs\u00a0<\/a>seems brighter.<\/span><\/p>\n<div class=\"next-image-styles\"><img decoding=\"async\" class=\"fr-fic fr-dib\" src=\"https:\/\/www.knowledgehut.com\/_next\/image?url=https%3A%2F%2Fd2o2utebsixu4k.cloudfront.net%2Fmedia%2Fimages%2F1668444838890-cyber-security-demand-1.png&amp;w=3840&amp;q=75\" alt=\"5 Most in-demand cyber security jobs\" data-nimg=\"responsive\" \/><\/div>\n<h2 id=\"cyber-security-jobs-in-greatest-demand\"><span lang=\"EN\" data-contrast=\"auto\"><span data-ccp-parastyle=\"heading 2\">Cyber Security Jobs in Greatest Demand<\/span><\/span><\/h2>\n<p><span lang=\"EN\" data-contrast=\"auto\">In the increasingly digital world, our interactions are mostly through different software applications, clouds and networks. Thus, this increased demand for\u00a0<\/span><span lang=\"EN\" data-contrast=\"auto\">cyber security career scope<\/span><span lang=\"EN\" data-contrast=\"auto\">\u00a0for those able to protect the interaction from cyber-attacks.<\/span><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<h3><span lang=\"EN\" data-contrast=\"auto\">1. Application Development Security<\/span><\/h3>\n<table>\n<tbody>\n<tr>\n<td><strong>Skill needed for Application Development Security<br \/>\n<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Strong coding skills in various languages including Shell, Java, C++, Python.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Knowledge of system platforms like Windows, iOs, Linux, etc<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Job Titles<br \/>\n<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Junior developer,<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">software developer,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">information\u00a0<a href=\"https:\/\/www.knowledgehut.com\/blog\/security\/security-engineer\">security engineer<\/a>,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">security software developer,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">security specialist,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\"><a href=\"https:\/\/www.knowledgehut.com\/blog\/it-service-management\/network-administrator\">network administrator<\/a><\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Potential Salary<br \/>\n<\/strong><\/td>\n<td>Rs 3.8 &#8211; Rs 12.0 LPA<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><span lang=\"EN\" data-contrast=\"auto\">2. Cloud Security<\/span><\/h3>\n<table>\n<tbody>\n<tr>\n<td><strong>Skill Needed for Cloud Security<br \/>\n<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Programming and database languages, including MySQL, Hadoop, Python, Ruby, Java, Php, and .NET;\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">knowledge of Linux and cloud service providers such as AWS, Microsoft Azure, GCP, and OpenStack<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">networking, web services, and APIs<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Job Titles<br \/>\n<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Cloud security engineer<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">cloud security architect<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">cloud security analyst<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">cloud security consultant<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Potential Salary<br \/>\n<\/strong><\/td>\n<td>Rs 3.7 &#8211; Rs 26.0 LPA<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>3. Threat Intelligence<\/h3>\n<table>\n<tbody>\n<tr>\n<td><strong>Skills needed for Threat Intelligence<br \/>\n<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Programming languages such as Java, Python, and C++, Linux and other OS<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Testing tools such as Nessus, Metasploit, SQLMap, and Jawfish<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Job Titles<br \/>\n<\/strong><\/td>\n<td>\n<ul>\n<li><a href=\"https:\/\/www.knowledgehut.com\/blog\/security\/cyber-threat-intelligence\" target=\"_blank\" rel=\"noopener\"><span lang=\"EN\" data-contrast=\"auto\">Cyber threat intelligence<\/span><\/a><span lang=\"EN\" data-contrast=\"auto\">\u00a0analyst,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">penetration tester,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">cyber vulnerability analyst,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">ethical hacker,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">assurance validator,\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">application security analyst<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Potential Salary<br \/>\n<\/strong><\/td>\n<td>Rs 4.6 &#8211; Rs 26.0 LPA<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>4. Identify and Access Management (IAM)<\/h3>\n<table>\n<tbody>\n<tr>\n<td><strong>Skills needed for IAM<br \/>\n<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">SQL and database management\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Directory technology and system authentication<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Scripting languages such as PHP, Perl, and PowerShell<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Job Titles<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">IAM engineer<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">IAM\u00a0<a href=\"https:\/\/www.knowledgehut.com\/blog\/security\/security-engineer\">security engineer<\/a>\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">IAM analyst<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">IAM architect\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Potential Salary<br \/>\n<\/strong><\/td>\n<td>Up to Rs 5.5 LPA<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><span lang=\"EN\" data-contrast=\"auto\">5. Data Security<\/span><\/h3>\n<table>\n<tbody>\n<tr>\n<td><strong>Skills needed for Data Security<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">For an entry- or mid-level technical positions- knowledge of programming languages for data storage, access\u00a0<a href=\"https:\/\/www.knowledgehut.com\/blog\/others\/what-is-management\">management<\/a><\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">For senior positions- knowledge of both national and international data protection regulations and data privacy laws<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Specialized certifications<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Job Titles<br \/>\n<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Data security officer\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Data protection engineer<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Data privacy analyst<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Privacy governance analyst<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td><strong>Potential Salary<br \/>\n<\/strong><\/td>\n<td>Rs 3.0 &#8211; Rs10.0 LPA<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>6. Non-technical Cyber Security Roles<\/h3>\n<table>\n<thead>\n<tr>\n<th>Name of Roles<\/th>\n<th>Skills Needed<\/th>\n<th>Job Titles<\/th>\n<th>Potential Salary<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Risk Management<br \/>\n<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Coding and programming languages\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Knowledge of governance, regulatory structures, and strategy<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Cyber risk analyst<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">cyber risk manager\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">cyber security analyst<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">information security risk analyst<\/span><\/li>\n<\/ul>\n<\/td>\n<td>Rs 3.0 &#8211; Rs 24.0 LPA<\/td>\n<\/tr>\n<tr>\n<td><strong>Security Compliance<br \/>\n<\/strong><\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Security control assessments and audits<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">FISMA<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">NIST<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">SOC-2 information security standards<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Common IT security-related regulations and standards such as Sarbanes-Oxley and ISO<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Specialized industry certifications.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/td>\n<td>\n<ul>\n<li><span lang=\"EN\" data-contrast=\"auto\">Cybersecurity policy analyst<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Cybersecurity compliance lead<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Cybersecurity compliance manager<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li><span lang=\"EN\" data-contrast=\"auto\">Cybersecurity compliance analyst<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:240,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/td>\n<td>Around Rs 3.0 LPA<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security secures computers, servers, mobile devices, electronic systems, networks, and data against malicious attacks. Alternatively, it&#8217;s called\u00a0information technology\u00a0security or electronic information security. As per the use, there are several cyber security measures. Some of them are: Network security\u00a0 Application security\u00a0 Information security\u00a0 Operational security Need\u00a0for Cyber Security\u00a0 With the increase in\u00a0cybercrimes, the threat of [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":3481,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[112,11],"tags":[],"class_list":["post-2980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article","category-news"],"_links":{"self":[{"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts\/2980"}],"collection":[{"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/comments?post=2980"}],"version-history":[{"count":1,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts\/2980\/revisions"}],"predecessor-version":[{"id":2981,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/posts\/2980\/revisions\/2981"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/media\/3481"}],"wp:attachment":[{"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/media?parent=2980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/categories?post=2980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/international.binus.ac.id\/computer-science\/wp-json\/wp\/v2\/tags?post=2980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}