Cyber Security Essay

317 words - 2 pages

Why Hire Me? _____________________________________________________________
I am a highly motivated and professional Security Engineer with (Linux Professional Institute
(LPI 102) certification and willing to pass CEH Certified Ethical Hacking). Capable of delivering
at the highest level. With excellent interpersonal skills, I am confident in my ability to become the
most valuable member of your company. I have developed expertise in networks security,
pentesting and managing IT functions on day-to-day basis. Never give up is my lethal weapon.
I am committed to facing fresh challenges.
KEY KNOWLEDGE, SKILLS & ...view middle of the document...

Control and Audit for network devices, operating systems, and database.
Manage access identity and users privileges.
Alliances Group
(Casablanca)
Responsibilities

Security Engineer

/05/2013 - /11/2013

Used a variety of network security testing tools and exploits to identify vulnerabilities and writing
reports.
Performed intrusion test on web servers and scan ports.
Implemented an intrusion detection system (IDS).
AMERICAN EXPRESS
(Casablanca)
Responsibilities

System Administrator

/06/2009 - /8/2009

Installation and configuration of computer hardware and software.
Follow the transfer from the 2nd Line to the 1st line support and troubleshooting.

PROFESSIONAL QUALIFICATIONS & EDUCATION__________________________
EITIA Consulting (Rabat)

2007-2012

University Med 1st (Oujda)

2005-2007

(

Special Achievements

Delivered a successful roll out of a new project where the results were proven to have saved the
Company 50% overheads in my area while increasing productivity by 30%.

Other assignments on Cyber Security

Operation Receiver Essay

607 words - 3 pages . The exercise took place in 1997 and the was a no-notice Joint Staff exercise designed to test DoD planning and crisis action capabilities when faced with attacks on DoD information infrastructures ("Interviews - John Hamre | Cyber War! | FRONTLINE | PBS", n.d.). The Red Team was played by the National Security Agency which used hacker techniques and software programs that were freely available on net ("Interviews - John Hamre | Cyber War

Cyber Crimes Essay

1600 words - 7 pages , the website was receiving more than 2,000 visits per second. Healthcare, government, industrial businesses and professional services continue to be the major industries affected by cyber crimes. Businesses continue to improve and increase their cyber security measures. However, cyber criminals are inventing new ways to circumvent these systems. For these reasons, information security has quickly become a primary focus for businesses as well

Cyber Law

3963 words - 16 pages rules prescribe the eligibility, appointment and working of Certifying Authorities (CA). These rules also lay down the technical standards, procedures and security methods to be used by a CA. These rules were amended in 2003, 2004 and 2006.Fundamentals of Cyber Law Information Technology (Certifying Authority) Regulations, 2001 came into force on 9 July 2001. They provide further technical standards and procedures to be used by a CA. Two important

Ethical Issues Arising From The Intersection Of Law, Compliance & Investigations

417 words - 2 pages practiced by each member of an organization. Privacy Protection act protects various organizations from secret information to be shared over Internet by any unknown person or an organization without owner’s permission. Such as an example these privacy laws are enforced against child pornography images that are shared over internet. Information and cyber security policies have to be practiced. References [1]. P, B. (2007). Ethical Aspects of

Database Security

281 words - 2 pages * Security in Database System * GROUP 5: * Chandra Muthineni Marat Talantov Bharath Rao Sinan Albayrak * Agenda * Introduction * Threats Of DataBase Security * Classification of Database Security * Process of Creating Database Architecture * Advantages * Conclusion * Q & A * References * Introduction * Database security is a crucial area that a firm should enhance in order to

Security Breach

558 words - 3 pages Cyber Attacks and Security: The Problem and The Solution Shamika A. Woumnm BIS/221 February 16, 2015 Gregorio Chavarria Cyber Attacks and Security: The Problem and The Solution In December of 2013, Target reported that up to 70 million customers worldwide were affected by a major security breach. It was reported that thieves stole massive amounts of credit and debit card information during the holiday season which also swept

Modern Day Attacks Against Firewalls And Vpns

2441 words - 10 pages the adoption and increase of IPv6 Denial of service attacks, which Akamai in a 2015 State of the Internet Security report noted as a new security risk (para 20, 2015). Finally, we have been fighting terrorism for over 10 years now and terrorist are utilizing these resources more and more daily. There are other countries with the knowledge and capabilities to conduct cyber attacks against the U.S. and with the increase of the availability of

Internet

444 words - 2 pages Another privacy issue is hacking. Because social networks do not offer security measures for their users, many of the computers used by networkers are vulnerable to hackers. Every bit of information on a networker’s computer becomes available to those skilled in this science, often without the knowledge of the networker. Along with the ability to hack is the ability to plant viruses. Many viruses today are passed through social networks

Cmgt 410 Week 2 Individual

1178 words - 5 pages country strives for. The U.S. will always be a major target for hackers from other countries as long as we have the technologies we have and are developing each day. With employees, zero-day exploits, and cyber espionage, the U.S. military has a high overall information security risk. Users will always be present and an ever growing vulnerability. Zero-day exploits have no patch or fix available and therefore will pose an increasing risk as

Jimmer Paper

624 words - 3 pages what we cannot ourselves, consistant base of security, and knowledge of solutions in the case of a cyber attack. Symantec Partners offers a flexible business model that appeals to each business individually, and offers solutions unique to each industry, and in my case, the dining business. 2. My first argument against oursource computer security is the lack of transperncy between myself, the management, and the entity managing the security. I

What Would You Do

328 words - 2 pages . Patients enjoy the freedom of being able to access all their pertinent medical information from all over the world. Yet, they don’t realize that many eyes are constantly watching their every move. With the freedom comes the threat of identity theft. No matter how secure a system is someone is always ahead of the game finding ways to slip through the cracks. According to Alan Paller, “there are at least 100 countries actively doing cyber-espionage (M

Similar Documents

Cyber Security In Business Essay

1513 words - 7 pages Cyber Security in Business Organizations Robin P. McCollin CIS 500 Information Systems – Decision Making Constance Blanson Fall 2014 The terms information security, computer security, and cyber security are all terms that are sometimes used interchangeably. To better understand the similarities and differences between the terms, one must first understand what exactly is being secured. For example, Information security is generally

Private And Public Sector Cyber Security Needs

2198 words - 9 pages -centered society, both public and private sectors have to keep up with and evolve just as quickly, while trying to be proactive when it comes to security. The world today is not as safe as it once was, and as it changes to a more paperless, technological-based society, access to information is becoming increasingly accessible. With this, cyber-attacks and security breaches have become a significant risk of doing business. As hackers, botnets

Cyber Crime Essay

262 words - 2 pages Cyber crime: The internet has become a part of our everyday lifestyle and made it easier for us in many ways. Although like many things in life, it also has its disadvantages as well. One of the major disadvantages with the internet is cybercrime. Cyber crime is the latest and perhaps the most complicated problem in the cyber world. The term “Cyber Crime” has nowhere been defined in any statute or Act passed or enacted by the Indian

Cause And Effect Essay

957 words - 4 pages more severe in cases of cyber-bulling because there is no escape for the victim. The internet and use of cell phones has enabled the harasser to intrude into the victim’s home and eliminate places of security. This has also allowed anonymity of the harasser which in turn, increases the likeliness that cyber-bullying will take place over the confrontational, school yard bullying scenarios. Although the acts of cyber-bullying may not always