Future Trends In Information Technology - Page 7

2. SECURITY A form of protection where a separation is created between the assets and the threat. Security provides "a form of protection where a separation is created between the assets and the threat." These separations are generically called "controls," and sometimes include changes to the asset or the threat. In most security systems, the "weakest link in the chain" is the most important. The situation is asymmetric since the 'defender' must cover all points of attack while the attacker need only identify a single weak point upon which to concentrate. In the IT Realm security includes: Application security; Computing security; Data security; Information security; and Network security. Skills and Knowledge for Security: Assurance Behavior analysis Big data analysis Disaster recovery Ethics Financial management Foreign policy Forensics Hacking - Distributed Denial of Service (DDoS) Mathematics Military/encryption Multilingual Pattern recognition Predictive analytics Problem solving Psychology Quantum mechanics theory Risk analysis Six Sigma Sociology Statistics and probability Surveillance Copyright North Central Texas InterLink, Inc. All rights reserved 6