Careers in IT

                                                                Team of programmers working in office

 

Careers in IT

 

Throughout the Intro to IT course at UAGC, we have been studying the fundamentals of information technology. We have learned many different aspects that will help us get started in the IT field. For my paper, I will be looking into different careers in the IT field and reviewing how the information we learned is relevant to those careers. In any IT career, it’s important to understand the concepts of IT and how computers operate. Each of the positions I’ve researched need to have a good understanding of the fundamentals of IT that we have covered in this course. An IT Technician needs to have a deep understanding of the major hardware components and how they work. Owning an extensive knowledge of programming languages is imperative to attaining a position as a Computer Programmer Analyst. As a Software Development Engineer, it’s necessary to understand the roles that application software’s play in our everyday lives. Working as a Database Administrator, one would benefit from understanding basic concepts of database. A Cybersecurity Analyst will use knowledge of network architecture and security in their field.

Understanding the history of computers and how they work is extremely helpful for all IT jobs. For instance, understanding Moore’s Law helps us to understand how technology works and gives an idea of what computers might be capable of in the future. In 1965, Gordon Moore predicted that the processing speed for computer would double every one to two years (Gregersen, 2011). This prediction has helped IT employees know what to expect from computers in the near future.

As an IT Technician, it’s vital to understand the major components and functions of a computer system. In order to do that job properly, one must be able to discern the different parts that make up a computer and how they work. One example would be the central processing unit or CPU of a computer. The CPU contains two major components which work together to act as the computer’s brain. If someone is having trouble with their computer turning on but not doing anything, this would be a sign for the technician that there is something wrong with the CPU.

A Computer Programmer Analyst relies on extensive knowledge of programming languages. According to Web Development Zone, a good programmer should have experience with multiple languages in order to be proficient at their job (2018). High-level languages allow programmers to attain better productivity by using higher level instructions (Vahid, 2019). Without these languages, programmers are back to programming with binary code.

Software Development Engineers work on computer applications. These engineers perform a range of tasks starting with creating the application to fine-tuning already completed applications. In order to be productive in this area, a software development engineer must understand the role that application software plays in the real world. During our course of study, we had the opportunity to work with Microsoft Office tools. The applications we used, varied immensely and were each helpful for different purposes. When creating applications, it’s extremely helpful to understand how they will be used by users. Having an understanding of the different applications available, help the engineer see where there might be a need for something completely new or just something updated.

Understanding databases is essential to many fields within IT, but especially for a Database Administrator. Understanding how work along with recognizing different types of databases is important. One type of database is a relational database. This is where basic data is store in rows and columns. A multidimensional database stores data in more than two dimensions. We also have object-oriented databases, where data is stores as a collection of objects, rather than tables (Vahid, 2019).

One occupation that has captured my attention is that of a Cybersecurity Analyst. For those wanting to work in cybersecurity, it’s extremely beneficial to have an understanding of basic concepts, such as network architecture and management. Another assignment we completed involved pinging and traceroutes. Understanding how a ping works is beneficial to understanding denial of service attacks. It’s also helpful in pinpointing exactly where a problem may be occurring.

Overall, there are many jobs available within the information technology field. The study that was done throughout this course will be beneficial to any career within that field.

 

 

 

 

References

 

Gregersen, E. (2011, July 21). Moore’s law. Britannica. https://www.britannica.com/technology/Moores-

Law

Paul, J. (2018, November 16). 5 Programming languages every programmer should learn. Web Dev Zone.

https://dzone.com/articles/5-programming-languages-every-master-developer-sho

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

Network Security


 

Network Security

Information and system security is extremely important to people and businesses. So much of our personal lives and information is stored online. If not kept safe, it can be accessed to steal our personal information. With such information, people can steal money, identities, our feeling of security, and more.

            One type of attack that can be executed using ping commands is a Denial of Service attack or DoS. This type of attack is done by overwhelming the victim’s server by sending large packets of data. One specific type of DoS attack is a Ping Flood Attack which is performed by, “…sending millions of random requests to a server in an attempt to slow it down to flooding a server with large packets of invalid data” (2022).

            Another type of attack is referred to as social engineering. This type of attack is extremely dangerous as it focuses on human vulnerability.  From an article by Joe Pettit, we learn that the five most common forms of social engineering include, phishing, pretexting, baiting, quid pro quo, and tailgating. The damage that can be done by this attack is allowing the attacker access to the information and/or control they are seeking. This type of attack can have numerous unforeseen symptoms as it is a gateway for other types of attacks. One way to fight against this type of attack is to educate people on proper cybersecurity protocol. Teach them what to look for and be weary of. Another protocol to protect against this type of attack is to have specific security measures in place. For instance, requiring every employee to scan their ID badge when entering a restricted area can help keep out unwanted attackers.

           

            Password Cracking is another form of attack. In password cracking, the attacker is trying to crack the user’s password. There are multiple methods for accomplishing this, including spidering, brute force attacks, and malware. (2022) The same article mentions that, “…the human is the weakest link of any security system.” This is exactly what makes computer systems vulnerable to this type of threat. The damage that can inflicted by these attacks is infinite. By gaining a user’s password, the attacker gains access to whatever information they’re looking for. One recommendation to protect against this type of attack is to have a strong password and change it often. Don’t use obvious words or phrases. Another way to help protect against password cracking is to not share your information with everyone. For example, the Facebook posts that ask you to fill out your old high school and first pets name, are easy ways to gain the information needed to crack your passcodes.

 

 

 

 

 

 

 

 

 

 

 

 

References

 

Editor (2022, March 28). Ping flood attacks. Security Boulevard.

https://securityboulevard.com/2022/03/ping-flood-attacks/

Jancis, M. (2022, June 23). Most popular password cracking techniques: learn how to protect your

privacy. Cybernews. https://cybernews.com/best-password-managers/password-cracking-

techniques/

Pettit, Joe (2022, March 22). 5 Social engineering attacks to watch out for. The State of Security.

https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-attacks-

to-watch-out-for/

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.