Introduction to Cyber Security
Network outages, hacking, computer viruses, and similar incidents affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users, digital applications, and data networks increase, so do the opportunities for exploitation.
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction.
Government agencies, the military, corporations, financial institutions, hospitals, and other groups collect, process, and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.
Mike Bruni of Booz Allen Hamilton discusses how the field of cybersecurity can affect your everyday activities.
And when you’re at UMUC…that is the time to take your innovative ideas and tinker with them and mature them. And then offer them to the greater good. Because cyber space is open to all of us. So when you innovate, you’re helping all of us.
Former Vice President of U.S. Public Sector Cybersecurity Practice, HP Enterprise Services
Since 2010, more than 4,000 UMUC students have graduated with a degree in cybersecurity. Now, we are preparing the next generation of leaders with more than 8,000 students currently enrolled in the program.
Cyber Security Careers
UMUC is uniquely positioned to fill the increasing demand pipeline for cyber security jobs. There will be a 1.5 million projected global shortfall of cyber security professionals by 2019. Source Plus, opportunities are close by: The demand for cyber security professionals is expected to grow. Source When you study with UMUC, you’ll be learning in the backyard of prospective employers!
Cyber Security Glossary of Terms
Learn cyber speak by familiarizing yourself with cyber security terminology from the Department of Homeland Security.
The ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions.
An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.
A list of entities that are blocked or denied privileges or access.
A computer connected to the Internet that has been surreptitiously/secretly compromised with malicious logic to perform activities under the remote command and control of a remote administrator.
A model for enabling on-demand network access to a shared pool of configurable computing capabilities or resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
The systems and assets, whether physical or virtual, so vital to society that the incapacity or destruction of such may have a debilitating impact on the security, economy, public health or safety, environment, or any combination of these matters.
The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
The interdependent network of information technology infrastructures that includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers.
The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
The processes and specialized techniques for gathering, retaining, and analyzing system-related data (digital evidence) for investigative purposes.
Enterprise Risk Management
A comprehensive approach to risk management that engages people, processes, and systems across an organization to improve the quality of decision making for managing risks that may hinder an organization’s ability to achieve its objectives.
The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality.
The process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.
The numerical value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification.
Software that compromises the operation of a system by performing an unauthorized function or process.
An actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system but does not attempt to alter the system, its resources, its data, or its operations.
An evaluation methodology whereby assessors search for vulnerabilities and attempt to circumvent the security features of a network and/or information system.
A digital form of social engineering to deceive individuals into providing sensitive information.
A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
The level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its lifecycle, and that the software functions in the intended manner.
A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
A list of entities that are considered trustworthy and are granted access or privileges.
Articles About Cyber Security
- Big Data: Dream or Potential Nightmare?: The vast amount of data being generated in our technologically connected world presents cyber security concerns.
- Unlocking the Secrets of Cyber Security: UMUC Cyber Security Program Advisory Board members discuss the challenges of hacking, tracking, and attacking in the virtual world.
Cyber Security Students
Meet successful students and alumni in UMUC’s cyber security programs who are gaining the skills they need to succeed.
The discount for Federal employees and their spouses and eligible dependents will be applied to out-of-state tuition and specialty graduate programs. It does not apply to doctoral programs. This discount cannot be combined with the Completion Scholarship for Maryland community college students or the Pennsylvania Completion Scholarship.
Undergraduate and standard graduate program tuition for students who meet the criteria for Maryland residency will be the applicable in-state rate. Tuition for active-duty military; members of the Selected Reserves, National Guard, and the Commissioned Corps of the U.S. Public Health Service and National Oceanic and Atmospheric Administration; and the spouses and dependents of these student groups will be the applicable military or specialty rate. If you are a student using Post 9/11 benefits, please contact an advisor at 800-939-UMUC to determine if you can apply both benefits.
View important information about the education debt, earnings, and completion rates of students enrolled in certificate programs.
All students are required to pay tuition for all courses in which they are enrolled. Tuition rates are subject to the approval of the University System of Maryland Board of Regents. They may be changed, or other charges may be included, as a result of the Board of Regents decisions. Notwithstanding any other provision of this or any other university publication, the university reserves the right to make changes in tuition, fees and other charges at any time such changes are deemed necessary by the university and the USM Board of Regents.
The Board of Regents has authorized the university to charge a student’s delinquent account for all collection costs incurred by the university. The normal collection fee is 17 percent plus attorney and/or court costs. The service charge for a dishonored check is $30. Requests for services (for example, transcripts, diplomas, registration) will be denied until all debts are paid.
Please see the USM residency policy for specific details about residency requirements.
Financial aid and tuition remission for University System of Maryland employees cannot be applied to noncredit courses. Golden ID benefits may not be applied to fees, noncredit courses, specialty graduate programs, or doctoral programs. Regular tuition rates apply for cooperative education, course challenge examinations, and EXCEL 301.
GI Bill is a registered trademark of the U.S. Department of Veterans Affairs. More information about education benefits offered by VA is available on the U.S. government GI Bill website.
The UCSP 615 requirement may be waived if you previously earned a graduate degree from a regionally accredited institution. For more information, contact your academic advisor.