Welcome to the iSMTA KickStart Introduction to Cyber Security Management Protection. The objective of this course is to provide the student with enough knowledge to understand the function of cyber security protection within a commercial business or organisation. This includes an understanding of the main functions of cyber security, cyber threats, risk reduction and good practice for students thinking about a career as a cyber security specialist.
The course will provide the student with enough detail to understand the role of cyber security and other related security functions within the business world. It will also demonstrate the possibilities of a rewarding and challenging career for those who decide to become a cyber security specialist. There are many cyber security protection specialists throughout the business world, from junior to senior positions, with responsibilities and work pressures that are commensurate with rewards.
Cyber Security within a Business
Cyber security is that part of protection within a business, or organisation, that is focused on enabling the authorised use of IT systems, at the same time as preventing unauthorised access. The main aim of cyber security is to help make the business more successful. This can involve strategies that enhance confidence with shareholders, customers and stakeholders, through to preventing damage to the business brand, actual losses and business disruptions. Cyber security should be applied to computing devices, such as desktops, servers, laptops, notebooks, smartphones and networks. The field includes all the processes and mechanisms by which digital equipment, information and services, are protected from unintended, or unauthorised access, change, or destruction and is of growing importance due to the increasing reliance on computer systems in most societies.
The Use of Cyber Security
Cyber Security is particularly relevant to the following:
The Cyber Security Specialist
A business needs a qualified specialist who can design and maintain the appropriate cyber security. This requires the specialist to know and understand: