Everyone knows that security is important in the digital age. Regular news reports of high-profile cyberattacks and data breaches leave no doubt about the need for reliable protection. But what is the difference between information security, cybersecurity, and network security?
There is definitely some confusion about these terms, in part because they overlap in many ways.
In a sense, information security dates back to the time when people started keeping secrets; in the early days, physical files and documents were literally kept under lock and key. Once the business world began to use computers, network security became essential to protect the electronic network infrastructure of these vital systems. The advent of the Internet changed everything, adding previously unimaginable technological capabilities, but also creating new vulnerabilities; and spawning an important new industry - cybersecurity.
So what's most important? While the first two are certainly critical to the practice of securing systems, information and assets, it is cybersecurity that is the main topic of discussion these days.
However, some studies see information security as a general term as it refers to processes and techniques designed to protect any confidential data and information from unauthorized access, whether in print or electronic form.
From this point of view, cybersecurity is a type of information security that is associated with protecting the organization's Internet-connected systems from potential cyberattacks; and network security is a type of cybersecurity that aims to protect an organization's IT infrastructure from network threats. Although these terms are often used in combination with each other, cybersecurity is considered a broader discipline, and network security is defined as one aspect of information and / or cybersecurity.
Information Security | Cybersecurity | Network security
How do some of the leading industry players define these important and closely related security terms?
Information security, according to the SANS Institute's Security Education Specialist, refers to “processes and methodologies that are designed and implemented to protect print, electronic, or any other form of confidential, private, and confidential information or data from unauthorized access, use, or misuse. , disclosure, destruction, alteration or violation. "The reference to" print "and information or data is significant because cybersecurity refers solely to digital or electronic information or data.
Cybersecurity, is “the practice of protecting systems, networks, and programs from digital attacks,” according to high-tech giant Cisco. “These attacks are usually aimed at accessing, altering, or destroying confidential information; extortion of money from users; or interruption of normal business processes. " PCmag simplifies the definition to "protecting data and systems on networks connected to the Internet."
Network security, as explained by the SANS Institute, is “the process of taking physical and software preventive measures to protect the underlying network infrastructure from unauthorized access, misuse, malfunction, modification, destruction or inappropriate disclosure of information, thereby creating a secure platform for computers, users and programs to perform critical functions allowed by them in a safe environment. "
What is the CIA Security Triad?
Whenever it comes to information security, network security, and cybersecurity, it is helpful to understand the CIA triad. While the term CIA may at first recall the dark world of spies and secrets when used in connection with the covert security industry, in this context it actually refers to a series of guidelines and goals that security professionals focus on when developing policies and procedures for an effective information security program. ... The three elements of the CIA triad are considered the three most important components of information security.
CIA - confidentiality, integrity, availability
Confidentiality: ensuring that information is not available to unauthorized people, usually through encryption, identifiers and passwords, two-factor authentication, and additional security strategies.
Integrity: protecting information and systems from modification by unauthorized persons, thereby ensuring the accuracy and reliability of protected data.
Accessibility: ensuring that authorized persons have access to information when needed; this includes strict maintenance of all systems, keeping them up to date with updates, using backups to protect against crashes or data loss, etc.
According to Techopedia, the CIA triad, widespread in the security industry, "was created to provide a basic standard for assessing and implementing information security regardless of the underlying system and / or organization."
Work in the field of information, networking and cybersecurity
Here's a more in-depth look at high-profile jobs in each of these security disciplines, as well as a selection of job titles from the listings on LinkedIn's employment site.
INFORMATION SECURITY
Information Security Director
The CIO is the senior manager who directs and manages the strategy, operations, and budget for protecting the enterprise's information assets. The area of responsibility will cover communications, applications and infrastructure, including applicable policies and procedures. Key responsibilities include:
-
Guide and align security design
-
Ensure disaster recovery and business continuity plans are in place and tested
-
Review and approve security policies, controls and cyber incident response planning
-
Review of investigations following violations or incidents, including impact analysis and recommendations to prevent similar vulnerabilities
-
Ensure cybersecurity policies and procedures are communicated to all personnel and that compliance is enforced
-
Manage all teams, employees, contractors and suppliers involved in IT security.
-
Continuously update your cybersecurity strategy to take advantage of new technologies and threat intelligence
LinkedIn (positions and employers):
-
Information Systems Security Officer (Amazon Web Services)
-
Information Security Risk Analyst (Adobe)
-
Information Security Architect (Cisco)
-
Information Security Manager (Quantcast)
-
Business Information Security Officer (Salesforce)
-
Information Security Engineer (Google)
-
Information Systems Security Officer (Raytheon)
CYBER SECURITY
Cybersecurity analyst
Cybersecurity analysts assess, plan, and implement security measures to help protect an organization from security breaches and attacks on its computer networks and systems. The work includes simulating attacks to identify vulnerabilities, testing new software to help protect company data, and helping users comply with new rules and processes to ensure network security. Additional responsibilities may include:
-
Monitor computer networks to identify any security problems or breaches that need to be addressed.
-
Install software, such as firewalls and data encryption programs, to protect your data and confidential company information.
-
Conducting system tests, including attack simulations, to identify and protect potential areas of vulnerability.
-
Develop processes and standards to maximize system security, including researching the latest trends in IT security and software.
-
Prepare reports to document and support ongoing security efforts as well as any security breaches.
LinkedIn (positions and employers):
-
Cybersecurity Architect (Lockheed Martin)
-
Cyber Information Systems Security Analyst (Northrop Grumman)
-
Vice President of Information and Cybersecurity (News America Marketing)
-
Cybersecurity Specialist Vulnerability Management (Irving Oil)
-
Chief Cybersecurity Architect (Comcast)
-
Cybersecurity Data Vulnerability Analyst (NBCUniversal)
-
Director of Cybersecurity Operations (City of Boston)
NETWORK SECURITY
Network Security Engineer
Network security engineers are responsible for preparing, deploying, configuring, and administering many different parts of the network, as well as security-related hardware and software. These include firewalls, routers, switches, various network monitoring tools, and virtual private networks (VPNs). These engineers are the company's first line of defense against unauthorized access from outside sources and potential security threats. Job responsibilities may include:
-
Testing for network vulnerabilities, working with IT staff to assess, test and troubleshoot technologies; identify, diagnose and solve security problems
-
Prepare comprehensive reports on assessment results, results and suggestions for further safety improvements.
-
Prepare documentation to ensure that proper protocols and processes are in place for the server and security infrastructure.
-
Creation, implementation and maintenance of network security
-
Vendor Relationship Management for Security Updates, Installation and Planning
LinkedIn (positions and employers):
-
Director of Network Security Architecture (Salesforce)
-
Network Security Engineer (Dropbox)
-
Chief Network Security Engineer (CBS Corp.)
-
Network Security Architect (Booz Allen Hamilton)
-
Head of Network Security (Verizon)
-
Principal Network Security Consultant (Symantec)
It should be noted that many of the positions employed by employers in these three related disciplines overlap to a large extent. For more information, visit CybersecurityVentures.com for a list of 50 “Every Job Seeker Should Know” jobs in this area.
Education requirements
It is well known that the security industry includes a wide variety of professionals with varying backgrounds and backgrounds - some mostly self-taught; others have advanced degrees.
This is important because across all industries, the demand for high-tech security professionals (information security, network security, cybersecurity) far exceeds the current supply. Simply put, technology has opened up new opportunities and new risks, but the workforce is still catching up.
To help address this talent gap and prepare the next generation of cybersecurity leaders, more colleges and universities are now offering continuing education programs. At the same time, computer and IT professionals in other fields are redefining their skills with an increased focus on security.
One such Master of Science in Operations and Cybersecurity Leadership program is offered entirely online at the University of San Diego to provide maximum flexibility to working professionals looking to take advantage of new career opportunities in the brave new world of cyberspace.