Course Reflection
It is very important for an IT professional to have knowledge about the security policies of the company that he or she works for. This is because security incidents in organizations occur from time to time. These incidents may result from either the actions carried out by employees and other staff in the organization or even their failure to act on certain occasions. Some of the ways in which employees may create security incidents include disclosure of private information to the wrong people, failure to report unusual activities in their computer system, and also unauthorized access of information.
For this reason, every organization should conduct regular security awareness programs to inform the employees of the importance of protecting organizational data or information, the consequences of mishandling information, and all the other risks involved if the security of organizational data is not ensured. When employees are aware of how to protect and handle information concerning their organization, the information security issues will be reduced. (Katz & Lindell, 2014)
Currently, I work as a cryptographer in a health facility where, together with my workmates, we have a major responsibility for protecting the data systems and servers from any security threat. We also provide technical support whenever needed in an attempt to solve any data security related issues such as detection of weaknesses or hackers. At the workplace, we deal with a lot of confidential information belonging to the clients; hence I need to understand the laid down security policies of the organization. This course will enable me to learn more about the maintenance and protection of data servers from any threats. I will also be able to know how security threats are designed in order to be able to protect my organization from such threats.
This course has enabled me to learn the techniques of recognizing threats, mitigation of risks, and quick recovery from destructive activities. This has helped to build trust for the health facility as hackers are kept as far as possible, and the security of information is guaranteed. It has also enabled me to learn how to build data systems, and respond to security threats in case they occur. Through the course, I have been able to learn my duties and responsibilities as a cryptographer. This involves testing the accuracy and reliability of data system in the organization as well as detection of any problems which may leave the data systems vulnerable for breach. A good cryptographer protects not only information and systems but also the individual staff members of the organization.
A good cryptography program enables the organization to gain trust from its customers as it proves to them that their information is safe in the hands of the organization (Frozen, 2007). it protects the organization from any security threats, maintains confidentiality of information. It also helps the business to recover quickly in the event of the happening of any risk regarding the information. I believe that the knowledge that I will gain from this course will help me to achieve my career goals.
References:
Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press.
Forouzan, B. A. (2007). Cryptography & network security. McGraw-Hill, Inc.