Friday February 28, 2020
Home Business Skills Requir...

Skills Required To Become An Information Security Analyst

Good analytical skills allow information security analyst to respond to incidents quickly

0
//
Analyst
It is vital that information security analyst is skilled and comfortable with the fundamentals of networking. This skill is specifically employable to maximise damage, malware and other cybersecurity threats are highly dependent on computer networks. Pixabay

Today’s rapid growth of technology comes along with the booming threat of cybercrime, thereby driving demand for more cybersecurity professionals. Here is a list of skills that every security analyst should possess to give the global population a safer tomorrow!

  • Communication

    Documenting incidents and communicating is the most important soft skill that information security analysts should possess. Good communication skills are not only essential during security incidents being escalated and passed around but also while working as part of a larger team. In addition to this, effective communication is needed at times when any records of activity or actions are taken is needed to be properly documented, which may be used in a legal proceeding.

  • Technology networking

      It is vital that information security analysts are skilled and comfortable with the fundamentals of networking. This skill is specifically employable to maximise damage, malware and other cybersecurity threats are highly dependent on computer networks. Besides acquiring basic information from network device logs, analysts should also possess knowledge of the OSI network model and network protocols. As a technology analyst, you should know what each piece of information signifies and how it might impact your analysis.  

  • Cybersecurity

      Understanding security fundamentals is equally important as developing networking knowledge. A solid understanding of various cyber threats can enable you to learn what patterns and behaviours to look for in your analysis. In order to be able to quickly identify suspicious or dangerous activity, you must familiarise yourself with the various patterns and different malware variants that are common to most attacks. A security analyst well versed in security fundamentals would be able to easily identify and deduce infected computers to be removed from the network and cleaned.

Cyber Security, Online, Computer, Cyber, Network
Today’s rapid growth of technology comes along with the booming threat of cybercrime, thereby driving demand for more cybersecurity professionals such as an Analyst. Pixabay
  • Analytical

     Good analytical skills allow information security analyst to respond to incidents quickly. Employers find it valuable when analysts are able to smoothly ability to function within a formal incident detection and response process. This is considered as one of the best practices in defending an organisation’s digital assets from cyber threats and even to prosecute the attackers.

  • Creativity

     This is another crucial soft skills that are critical for information security analysts to be able to anticipate cyber-attacks and always think one step ahead of a cyber threat. Detail-oriented forward-thinking requires a creative approach that may allow analysts to detect threats to cybersecurity, which are typically are hard to detect. Furthermore, information security analysts are expected to be focused on the details of a security system, noting any minor changes and foreseeing any potential problems, no matter the size of it.

ALSO READ: Here’s Why Alphabet CEO Sundar Pichai Believes That Artificial Intelligence Needs To Be Regulated

These skills put emphasis on the importance of IT Security Management degree. So apply today to develop the skills required to become an analyst.

Next Story

Vulnerability in 4G May Help Hackers To Impersonate You: Researchers

For a successful attack, the attacker must be in the vicinity of the victim's mobile phone, said the researchers

0
Attacker
An attacker can upload secret company documents and to network operators or law enforcement authorities, it would look as if the victim is the perpetrator. Pixabay

Researchers have found a serious vulnerability in LTE/4G mobile communication standard that can help hackers impersonate other phone users, take a streaming service subscription at your expense or publish secret company documents under someone else’s identity.

The vulnerability — which affects virtually all mobile phones, tablets and some connected household appliances — may also hamper investigations of law enforcement agencies because attackers can not only make purchases in the victim’s name but can also access websites using the victim’s identity.

For example, an attacker can upload secret company documents and to network operators or law enforcement authorities, it would look as if the victim is the perpetrator, said researchers from Ruhr-Universitat Bochum public university.

“An attacker can book services, for example stream shows, but the owner of the attacked phone would have to pay for them,” said Professor Thorsten Holz from Horst Gortz Institute for IT Security.

Only changing the hardware design would mitigate the threat. The team is attempting to close the security gap in the latest mobile communication standard 5G, which is currently rolled out.

“Mobile network operators would have to accept higher costs, as the additional protection generates more data during the transmission. In addition, all mobile phones would have to be replaced and the base station expanded. That is something that will not happen in the near future,” said David Rupprecht.

The problem is the lack of integrity protection: data packets are transmitted encrypted between the mobile phone and the base station, which protects the data against eavesdropping.

However, it is possible to modify the exchanged data packets. “We don’t know what is where in the data packet, but we can trigger errors by changing bits from 0 to 1 or from 1 to 0,” said Rupprecht. By provoking such errors in the encrypted data packets, the researchers can make a mobile phone and the base station decrypt or encrypt messages.

Hackers
Researchers have found a serious vulnerability in LTE/4G mobile communication standard that can help hackers impersonate other phone users, take a streaming service subscription at your expense or publish secret company documents under someone else’s identity. Pixabay

They not only can convert the encrypted data traffic between the mobile phone and the base station into plain text, they can also send commands to the mobile phone, which are then encrypted and forwarded to the provider – such as a purchase command for a subscription.

The researchers from Bochum used so-called software-defined radios for the attacks. These devices enable them to relay the communication between mobile phone and base station. Thus, they trick the mobile phone to assume that the software-defined radio is the benign base station; to the real network, in turn, it looks as if the software-defined radio was the mobile phone.

ALSO READ: India’s Cooperation With Russia For AI Innovation May Reach Level of Strategic Sector Soon

For a successful attack, the attacker must be in the vicinity of the victim’s mobile phone, said the researchers. (IANS)