You are on page 1of 7

ISSN: 2249-4707 (Online)

Current Trends in ISSN: 2348-7895 (Print)

Information Technology Volume 11, Issue 1, 2021


DOI (Journal): 10.37591/CTIT
STM JOURNALS
http://computerjournals.stmjournals.in/index.php/CTIT/index

Review CTIT

Why Choose Cyber Security as a Career


Dhaval Chudasama*

Abstract
Now a big question: a rise in front of what is my career. Career is a big word but it is highly
pressurized. Right chosen career is to survive your life. Here I write about the study on cyber security
as a career and it is how to bring success in your life. After the completion of the 12th Science or
diploma in information technology, computer engineering is a big question raised in front of what is
next. Every time students and also parents worry about the career of his/her child. How to choose the
correct path to survive life? Many of them attended webinars, seminarsand also took expert advice to
choose a right path for his/her child. Here I write about cyber security as a better career path for the
future. Cyber security choice in B Tech, be in minor specialization or M Tech/ME in specialization
and alsodo as PG course of cyber security. Cyber security nowadays isan upcoming industry in India
and also the world. Cybercrime is expanding day by day; that is why important cyber security experts
are required.I hope this study is my view that it is more useful to choose your right pick for your
career. I wish you pick cybersecurity as a career and rock in the world.

Keywords: Cyber security, cyber security career, career in cyber security, cyber expert, cyber
security adviser.

INTRODUCTION
Career is not a question but a life. Correct career path is a better life for survival. But the wrong
path chosen destroys life and career also. That is why each and every time parents and students, after
clearing the class 12th or diploma, question is what a course chosen is. What courses to take andhow
much money to earn in the future, because the right course riches the pick in the career. Earn good
money and live a better life. You can take all advantages of life. You can visit various places, make
beautiful houses, wear good clothes, eat good food etc. A course is not just a course but it is a life.
Correct time of picking a path you can rule in the world. Here in this study I have discussed that cyber
security is the best course for the career and also you can make a bright future[1].

WHAT IS CYBER SECURITY?


Physical security is safe facilities and objects within the world. Cybersecurity is safe information
systems and data. Cybersecurity is safe computer, computer systems, networks, mobile devices,
programming code, and data from thoughtthe
*Author for Correspondence attackers [2].
DhavalChudasama
E-mail: dhavalchudasama16@gmail.com
Types of Cyber Security
Assistant Professor, Department of Computer Science &
Engineering, Indrashil University, Rajpur,Kadi,Mehsana, • Application Security: Focuses on finding and
Gujarat, India fixing vulnerabilities in application codes to form
apps safer.
Received Date: May 05, 2021
Accepted Date: May 10, 2021 • Network Security:Aims to stop and protect
Published Date: May 15, 2021 corporate networks from intrusions like malware or
Citation:DhavalChudasama.Why Choose Cyber Security
targeted attackers.
as a Career.Current Trends in Information Technology. • Operational Security: Includes the processes
2021; 11(1): 14–19p. and decisions for shielding and managing data assets.

© STM Journals 2021. All Rights Reserved 14


Why Choose Cyber Security as a Career Dhaval Chudasama

It encompasses user permissions for network access and therefore the procedures that dictate the
way data should be stored and shared safely.
• Information Security: Safeguards data integrity and privacy during its storage and transmission
from one machine to a different.
• End-User Education:Anyone can unintentionally introduce a cybersecurity threat like an epidemic
by failing to follow safe security practices. Thus, educating end-users to delete suspicious emails,
refraining from plugging in unidentified USB drives, and other essential lessons are vital for
shielding corporate security.
• Disaster Recovery and Business Continuity: It defines how a corporation responds to a
cybersecurity incident that causes data loss or service outage and the way it will restore its
information and operations to return to an equivalent operating capacity as before the event.
Business continuity is the plan a corporation will believe while operating without specific
resources[3].

Types of Cyber Security Threats


Cybersecurity faces 3-fold threats:
• Cybercrime: Making a team and one person targeting systems to cause disruption.
• Cyber-attack: Includes politically motivated operation.
• Cyber-terrorism:It is for panic or fear by undermining electronic systems.

Following below methods are used for compromising cyber security:


• Malware:Malware is a cyber-attack from the hackers entering a malicious code in the user’s
computer. Malware spreads through download or email attachment. There are various sorts of
malware, like Trojan, virus, ransomware, spyware, botnets, and adware.
• Phishing: In phishing, a cyber-criminal sends people emails that appear to be from a legitimate
company to invite sensitive information like MasterCarddetails or personal data. It is then they
won’t to dupe them for gain.
• SQL Injection:During this sort of cyber-attack, a cybercriminal exploits a vulnerability in data-
driven applications to insert malicious code into a database employing a malicious SQL statement
for taking control of the database to steal data.
• Denial-of-service attack:During this sort of attack, a cybercriminal prevents a computer from
fulfilling legitimate requests. It overpowers the organizations and workers with traffic and
delivers the framework unusable. It prevents a corporation from managing its vital functions [4].
• Man-in-the-middle attack:This sort of attack involves a cyber-criminal intercepting
communication between two individuals for stealing data.
• Cyber Security Frameworks:It is a group of policies and procedures for the business. These types
of cyber security are designed by various cybersecurity organizations and government agencies
and function guidelines for businesses to reinforce their cybersecurity.

It provides details about how to implement a five-step cybersecurity process:


• Identify: Shortlist sensitive assets within the organization.
• Protect:Lookout for required maintenance to safeguard data and assets.
• Detect:Detect intrusions and breaches.
• Respond:Answer breaches.
• Recover:Get over any damage to data, systems, finance, and reputation,thanks to the attack.

Cyber Security Skill Gap


Nowadays, there is a more demand for cyber security professionals; currently the industry faces a
shortage of cybersecurity experts. According to a NASSCOM report in 2019, India needs 10 lakh
cyber professionals by 2021.

© STM Journals 2021. All Rights Reserved 15


Current Trends in Information Technology
Volume 11, Issue 1
ISSN: 2249-4707 (Online), ISSN: 2348-7895 (Print)

Insufficiency of cyber security experts in companies is,having to pay to high salaries to


cybersecurity professionals. According to severalreports, the average cybersecurity experts’ salaries in
India have grown to INR 8.8 lakh [5].

CYBER SECURITY JOBS AND SALARIES IN INDIA


Network Security Engineer
It is a critical position in every organization. This individual is liable for protecting the
organization’s assets from threats and wishes to possess astute organizational, technical, and
communication skills. The job responsibilities encompass attention on internal control within the IT
infrastructure, including designing, building, and protecting scalable, secure, and robust systems,
assisting the corporate in understanding advanced cyber threats, performing on operational data center
systems and networks, and helping create robust strategies to guard the organizational structure. They
also over sethe upkeep of routers, firewalls, switches, VPNs, and various network monitoring tools as
shown in Figure 1[6].

The salary of a network security engineer ranges from Rs. 4 to 8 lakh per annum.

Cyber Security Analyst


A cybersecurity analyst is additionally mentioned as an IT security analyst, security analyst, data
system security analyst, or data security analyst. The person is primarily liable for planning,
implementing, and upgrading security controls and measures. The work involves maintaining data,
monitoring security access, and protecting information systems and digital files against unauthorized
access, modification, and destruction. A security analyst is forecasted to manage a network, intrusion
detection and prevention systems, conduct internal and external security audits, and analyze security
breaches to work out their root cause. There is a separate additionally liable for defining, maintaining,
and implementing corporate security policies and coordinate security plans with outside vendors. The
person is as well liable for training fellow employees in security procedures by following best
practices to avoid security breaches as shown in Figure 2[6].

The yearly salary of a cyber security analyst average is Rs. 5 to 6 lakhs.

Security Architect
A security architect performs the main role in designing the pc and network security architecture
for a corporation. A security architect does it by researching, planning, and developing security
elements. The individual creates a design supporting the company’s needs and then works alongside
theprogramming team to form the ultimate structure.

Figure 1.The average salary for a Network Security engineer.

Besides planning the architecture, a security analyst is predicted to develop organizational


procedures and policies regarding how employees should use the safety systems and choose on the
punitive actions just in case of any lapses. Thus, the person is predicted to understand the business
with an in-depth awareness of its technology and knowledge needs as shown in Figure 3 [6].

© STM Journals 2021. All Rights Reserved 16


Why Choose Cyber Security as a Career Dhaval Chudasama

The yearly compensation of a security draftsman begins at INR 17–22 lakhs.

Figure 2.The average salary for a Cyber Security analyst.

Figure 3.The average salary for a security architect.

Cyber Security Manager


A cybersecurity manager creates strategies to reinforce internet and network security associated
with various projects. This person is liable for maintaining security protocols throughout the
organization and manages a team of IT professionals to make sure the very best standards of
knowledge security are stringently maintained. The individual is predicted to frequently review the
prevailing security policies and confirm that the policies support new threats. Further, the person
performs regular checks on all servers, routers, switches, and other connected devices to verify that
there are not any loose ends or lapses within the security system. The person is additionally expected
to rent new employees, prepare and oversee budgets, and evaluate and procure new security
technologies and tools as shown in Figure 4[6].

The yearly salary of a cyber security manager is Rs. 12 LPA.

Chief Information Security Officer (CISO)


Also mentioned as CSO (Chief Security Executive), CISO may be a C-level management executive.
A report from PWC states that these days, 80+% of organizations have a CISO on the management
team. A CISO oversees the operations of a company’s IT security and related staff.

© STM Journals 2021. All Rights Reserved 17


Current Trends in Information Technology
Volume 11, Issue 1
ISSN: 2249-4707 (Online), ISSN: 2348-7895 (Print)

Figure 4.The average salary for a cyber security manager.

Figure 5.The average salary for a CISO.

This person is liable for directing and managing operations, strategies, and budgets to safeguard the
organization’s information assets. A CISO works with the team to spot, build, implement, and manage
organization-wide processes to make sure there are not any security breaches. The person is
forecasted to reply to incidents and devise appropriate controls and standards to mitigate security risks
maintaining the required business continuity as shown in Figure 5[1].

The yearly salary of a chief security executive average is Rs. 23 LPA.

Ethical Hackers
Ethical hackers are liable for identifying vulnerabilities and security flaws and help businesses from
malicious hackers. They work with the authorization of the organizations; they add to make sure that
their hacking efforts are legal and legit.

They are liable for penetrating computer systems and networks to quickly find and fix computer
security vulnerabilities, perform reverse engineering, application analysis, protocol analysis, malware
analysis, and debugging. Some ethical hackers begin with IT experience and obtain Certified Ethical
Hacker credentials provided by the International Council of E-Commerce Consultants as shown in
Figure 6 [7, 8].

The yearly salary of an ethical hacker average is from Rs. 5 to 6 lakhs.

Nowadays cybersecurity is the most demanding career. It gives more salary for the cybersecurity
professionals in the current scenario. The best option is to choose newcomers. If you want to pursue
this profession B tech/BE in minor specialization or MTech/ME in specialization and also do a PG
course of cyber security.

This is completely course ME/MTech for a duration of 2 year and in BE/BTech is study cyber
security subject during his/her course. In this course faculty is taught programming languages and
tools.

© STM Journals 2021. All Rights Reserved 18


Why Choose Cyber Security as a Career Dhaval Chudasama

Figure 6.The average salary for a Ethical Hacker.


HOW TO PURSUE A CYBER SECURITY CAREER?
In this course faculty gives various tasks like case studies, projects for much better for hands on
practice or experience, improving your theoretical and practical knowledge. At theend of course, your
project's tasks validate your understanding and knowledge of the program.

The course is meant for IT, Computer Science, Electronic and communication and technology
professionals, data professionals, IT and technical project leads and managers, testing professionals,
and programming language coding professionals also, sets you up for different network safety space
positions, including online protection engineers, online protection specialists, and programming
designers. You would like to possess a Master’s and Bachelor’s degree in attending the course, and no
prior coding experience is required[6, 9, 10].

CONCLUSION
After reading a paper you people have much better ideas and made a decision for cyber security is a
career. So you guys without worry enroll your child in this course. This course is not just a course but
makes your child's life better. With your child you also survive the rest of life much better. Cyber
security is not a course but a game changer of your life. So take cyber security and bright your future.

REFERENCES
1. Chudasama DM, Sharma LK, et al. A Comparative Study of Information Systems Auditing in
Indian Context. IPASJ International Journal of Information Technology (IIJIT). 2019;7(4):020–
028.
2. ShahS, LokhandwalaMA, ChudasamaPD. Decoding Farm Laws Abstract :2021; 4(2): 590–595.
3. Chudasama PD, Dand P, Patel K. Awareness of Data Privacy Breach in Society. International
Journal of All Research Education and Scientific Methods (IJARESM). 2020;8(10):303–307.
4. Dhaval Chudasama, Patel NSD, et al. Research-on-cybercrime-and-its-policing. American
Journal of Computer Science and Engineering Survey (AJCSES). 2020;8(3):3–5.
5. Chudasama DM, SharmaLK, et al. Framework of Information Systems Audits in Indian Context.
International Journal of Computer Sciences and Engineering (IJCSE).2019;7(5):331–345.
6. UpGrad Blog (2021, 3 Jan) Cyber Security Salary in India: For Freshers & Experienced.[Online].
2021. Avaliable from https://www.upgrad.com/blog/cyber-security-salary-in-india/ [Last Access:
14/04/2021].
7. Sara Norden. How the Internet has changed the Face of Crime. Semantic Scholar. 2013.
8. Payne Brian K, Lora Hadzhidimova. Cyber Security and Criminal Justice Programs in the United
States: Exploring the Intersections. Sociology & Criminal Justice Faculty Publications. 2018;
13(2): 385–404.
9. DhavalChudasama. Current Thinking & Temperament Scenario in the Society. OmniScience: A
Multi-disciplinary Journal. 2021;11(1):12–15.

© STM Journals 2021. All Rights Reserved 19


Current Trends in Information Technology
Volume 11, Issue 1
ISSN: 2249-4707 (Online), ISSN: 2348-7895 (Print)

10. SomnathBasak, DigbijayGuha, et al. Cyber Crimes- Challenges & Solutions. International Journal
of Computer Science and Information Technologies (IJCSIT). 2013;4(5):729–732.

© STM Journals 2021. All Rights Reserved 20

You might also like