Cyber Security ID and Authentication

Hi all! David here. I hope everyone has had a great start to the year. I know mine has been wonderful, as I have been working alongside Mr. Ashley, learning and discussing issues pertaining to the world of computing security and information assurance.

Computer security (or cyber security, info security, digital security, they all mean the same thing). It’s a broad topic which contains dozens of components and thousands of job opportunities (and, yes, you can still be involved in cyber security without being a math whiz).

Nations, terrorists, terrorist nations, the list goes on. Enemies everywhere are beginning to turn to another form of warfare, not with bullets or RPGs, but with bits, bites and the touch of a keyboard. Pipelines, power grids, traffic lights, and anything pertaining to critical infrastructure is exposed. On a personal level, accounts, shopping, finance, bank accounts, and anything YOU have are targets for hacks.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s