answersLogoWhite

0

Computer systems security

Updated: 11/11/2022
User Avatar

Wiki User

15y ago

Best Answer

Depends on the job requirements,

In the USA some broad numbers are anywhere from $45K annually for a relatively unskilled worker.

$250,000 annually for a skilled practioner with experience as a penetration tester, Chief Security Officer who has developed and implemented security policy as strategy and versed with privacy laws and regulations in the USA and international venues.

This same individual will likely have a resume which resembles a master tradesman like a master electrician who started out as systems administrator of Win32, UNIX/LINUX and network operating systems such as Cisco IOS/CatOS who leveraged their extensive system knowledge to approach and design systems from the security perspective while maintaining functionality and with little impact on the end user experience.

The best security practioners are skilled sys admins at the core since this fundamental knowledge is crucial to understanding risk proposition and determining real level of effort when designing security implementations and practices of common technologies.

NASA doesn't train pilots, NASA recruits top military pilots and trains them to fly spacecraft, a top security practioner is the same example.

Certifications make a huge difference, the most common is the Certified Information Systems Security Professional, however the actual exam itself is banal and less challenging then picking your nose with your left hand. More organizations are recognizing the lack of value of the CISSP since too many of them have joined companies and ruined their security and had to be fired because they talked their way into $90K jobs when they were really more like $45k people.

The majority of CISSP's are IT auditors, and the great majority of IT auditors are just financial auditors and Accountants "who are good with computers" and have a less than adequate understanding of how to efficiently design systems and the security protecting those systems. These are the kinds of people that find the CISSP exam challenging and have to study for weeks or months since they're really trying to learn the tradecraft for the first time as they're about to take a certification exam which claims to require 10 years of computer/InfoSec experience (but never really verified).

ISC2 who administers the CISSP designed the test around 10 domains, one including ethics which is laughable since the same organization plagiarized a law journal for the Legal domain. Rather sad for a "non-profit" group that charges $500 for a test and they couldn't afford to license or develop original content.

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Computer systems security
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What has the author Gerald D Cole written?

Gerald D. Cole has written: 'Design alternatives for computer network security' -- subject(s): Computer networks, Computer security, Security measures 'Implementing OSI networks' -- subject(s): Computer network architectures, Computer network protocols, Computer networks 'Computer networking for systems programmers' -- subject(s): Computer networks, Systems programming (Computer science)


Does ZoneAlarm offer home security systems?

Zone Alarm offers computer security for both home and office. They do not offer home security systems. You could try another company such as ADT for home security.


What has the author Susanto Rahardja written?

Susanto Rahardja has written: 'Multimedia systems and applications X' -- subject(s): Multimedia systems, Security measures, Computer networks, Congresses 'Multimedia systems and applications X' -- subject(s): Multimedia systems, Security measures, Computer networks, Congresses


When was the Pinnacle computer networking security founded?

The Pinnacle Computer Services company was founded in 1988 in Indiana. The company provides security services for computer systems, including training and software solutions.


What has the author David K Hsiao written?

David K. Hsiao has written: 'Design analysis of update mechanism of a database computer (DBC)' -- subject(s): Electronic digital computers 'Computer security' -- subject(s): Computer security, Electronic data processing departments, Security measures 'Systems programming' -- subject(s): Database management, Systems programming (Computer science)


What has the author Michael Purser written?

Michael Purser has written: 'Secure data networking' -- subject(s): Accessible book, Computer networks, Computer security, Management, Security measures 'Computers and telecommunications networks' -- subject(s): Computer networks, Telecommunication systems, Data transmission systems 'Data communications for programmers' -- subject(s): Data transmission systems, Computer programming


What has the author J A T Pritchard written?

J. A. T. Pritchard has written: 'Computer security' -- subject(s): Computer security, Electronic data processing departments, Security measures 'Introduction to On-line system' 'Security in communications systems' -- subject(s): Computer networks, Data transmission systems, Security measures 'Risk management in action' -- subject(s): Auditing, Electronic data processing departments, Risk management, Security measures


What happens if you join anonymous?

Nothing unless you're specially gifted in computer networks, computer science, computer manipulation and technological security systems.


In the history of the study of computer security what system is the father of almost all modern multiuser systems?

MULTICS


What has the author Thomas Norman written?

Thomas Norman has written: 'Integrated security systems design' -- subject(s): Security measures, Computer networks, Computers, Information storage and retrieval systems, Access control


What has the author John McCumber written?

John McCumber has written: 'Assessing and managing security risk in IT systems' -- subject(s): Computer security, Data protection, Risk assessment, OverDrive, Computer Technology, Nonfiction


How do you become a fraud investigator?

by knowing all security checks and how frauders do their job especially using computer systems