Security professionals are among the most highly-paid, highly-respected IT experts in the industry. Here are some great reasons why.
How Networks are Built
When most people think about computer networks and what they consist of they’ll probably list servers, storage, switches, routers, cables, wireless, and client devices.
Starting in 1970 and culminating around 1983, the International Standards Organization (ISO) worked with the Comité Consultatif International Téléphonique et Télégraphique (CCITT) to develop a seven-layered abstract Basic Reference Model for Open Systems Interconnect (OSI). A tour through this model helps people understand how computer networks basically operate.
Moving outward from the user, data is entered into the network through software running on the Application layer. This application is running on a device-based operating system such as Windows at the Presentation layer which is signed in through the Session layer. Data is moved from that user to another destination by the Transport layer which uses the Network layer to connect to that destination. This connects to the actual network via a network interface card at the Data-Link layer which, finally, connects to the actual cabling and wireless infrastructure at the Physical layer.
Arriving at the other end, the data travels back up the seven layers to arrive at its intended destination. Each layer has its own protocols and other communication standards that govern its efficient operation.
Where in the Model is Security?
Seems like an obvious question, and the short answer is “yes!”
Experts emphasize the importance of “multi-layer” security for a very good reason. If security is not efficiently and effectively embedded into every layer of the ISO-OSI model, every step along the path data takes from origin to destination, it is vulnerable and ineffective.
Imagine a building with seven doors providing entry. If all seven doors are locked, the building can be considered secure. If one is left unlocked, the entire building is insecure. It really is just that simple. Unless every layer of the network is secured, penetration can occur. Data can be compromised. And compromised data creates existential danger. According to Inc. Magazine, 60% of businesses whose data is significantly compromised go out of business and don’t return.
What is the Learning Path for Security Experts?
The answer to this question represents the most compelling reason for cross-training. Since assuring security exists at every level of the ISO/OSI model, students need to learn about each layer. There are communication standards and protocols at almost every layer, and the ability to manage security depends upon a solid understanding of the interaction between protocols at each layer with protocols at the adjacent layers.
Fortunately, your New Horizons counselor guides you through the various courses and experiences required to provide you with all the education required to achieve the most-recognized certifications in the security segment of the IT industry, including Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), CompTIA Security+, and Certified Ethical Hacker (CEH).