What Is Cyber Security? A Beginner's Guide

 padlock icon with lines connecting to other tech icons

There’s a definite cool factor whenever one of your friends announces their tech-related job title. Among all the analysts, developers and programmers, one technology role never fails to catch your attention: cyber security.

You’d love to be able to proudly say that you’re part of a cyber security team—but you don’t actually know much about the job. Talking about cyber security conjures up images of international spies hacking government networks in a dark basement somewhere. You know that can’t be right ... can it?

Working in cyber security may not always be that dramatic, but it’s still an expanding career worth exploring. In fact, the Bureau of Labor Statistics (BLS) projects that employment of information security analysts will grow by 28 percent through 2026—and that’s just one of the job titles available in this career field.1

What is cyber security all about? We’re bringing you the full scoop on the world of cyber security, including the history of how this career came to be and what experts in the industry have to say about its future.

What is cyber security?

Cyber security is a subsection of the technology industry that focuses on protecting the safety of “computers, networks, electronic devices and digital information from cyberattacks,” says Zubair Alexander, founder, CEO and network security engineer at SeattlePro Enterprises.

Cyberattacks are serious business that can affect millions of people. “Electronic devices, networks and data are valuable assets for companies and individuals,” says Olga Sushko, privacy and security advocate at MacKeeper. “Cybercriminals may want to compromise these electronic systems and intercept data for financial gain, sabotage, espionage or even just for fun.”

No digital user is safe from cyberattacks. Hackers target everyone from large corporations to individual users—even the U.S. military! “The people in general, and the governments in particular are having a difficult time keeping up with all the technological changes,” Alexander says. “Nations are fighting cyberwars, rather than resorting to traditional warfare.”

Cyber security is the field that has developed in response to these attacks. These specialists are involved in a range of duties, from deploying specialized software to preventing cyberattacks to “trying to change the users’ mindsets towards conscious behavior online,” Sushko says.

One thing is for sure about this tech-driven career: The job duties of a cyber security specialist have been evolving since the very beginning of the field.

Cyber security history

You may be surprised to learn that the exploits and issues cyber security professionals deal with have been around in a basic form for decades. In the early 1970s, the experimental self-replicating “Creeper” virus made minor waves hopping from mainframe computers connected via ARPANET. The damage? Infected machines printing the message, “I’m the creeper, catch me if you can!” While that amounts to a minor annoyance by today’s standards, the solution for removing this pesky program is believed to have spawned the first anti-virus software. The significance of this may not have been fully appreciated at the time, but the value of keeping connected machines secure became much clearer as the use of the internet became more widespread.

“It wasn’t until the ‘90s when we started to experience viruses, such as ILOVEYOU and Melissa, which infected millions of computers around the world very quickly,” Alexander says.

As technology evolved, it became clear that laws and security measures were needed to protect users from hackers. Congress enacted the Computer Fraud and Abuse Act in 1986, marking the first law against computer-related crimes like data theft and unauthorized network use. Two years later, a student named Robert Tappan Morris became the first person convicted under this act after releasing code that by some estimates incapacitated 10 percent of the computers that were linked to the internet at the time.

The number of people using the internet—and the internet’s capabilities themselves—expanded rapidly over the next two decades. Web development tools and smartphones themselves became widely used, but many had security flaws that left users open to cyberattacks. Cyber security experts worked hard during this time to tame the Wild West of technology, scrambling to stay ahead of hackers as more and more devices connected to the online network.

The Washington Post reports that in 2010, a Pentagon advisory group called for “a more fundamental understanding of the science of cyber-security.”1 This understanding is what cyber security specialists seek to develop day in and day out as they work to prevent—and minimize the damage stemming from—cyberattacks.

Cyber security growth

Both the internet and users’ technology habits have changed dramatically since the early days of network connectivity, and the professionals working in cyber security need to stay on their toes to prevent cybercrimes.

“Tools used by both cybercriminals and security experts become more complex and automated,” Sushko says. “This is why it takes years of constant learning to become a skilled cyber security specialist.”

The stakes are high for the future of cyber security, and organizations across the nation are taking cyberattacks as a serious threat. “The cyber security landscape has expanded in response to the increase in cybercriminal activities,” Alexander says. “The private and public sectors, military and the intelligence agencies in the United States have invested heavily in cybersecurity services, personnel and equipment.”

Though no one knows exactly what the future holds for this vital field, new ways of looking at cyber security are on the horizon in the hopes of deterring criminal attacks. For example, Alexander believes the zero trust network security model—a strict approach to network design where the default level of connectivity for even internal network users is extremely limited—is the next step in countering hackers.

“Because these data breaches are so harmful to the general public and corporations, cybersecurity is literally changing the way computer networks and devices are to be protected from cyberattacks,” Alexander says.

Cyber security careers

In most cases, a team of cyber security professionals will work together to create a safer network for their organization. Here’s a brief look at some of the cyber security job titles you might encounter:

  • Information security analysts take measures to protect their organization’s networks, such as firewalls, encryption programs and the latest cyber security trends. They watch for signs of a breach, investigate security problems and document damage caused by hackers, according to the BLS.2
  • Data privacy officers are “responsible for data protection compliance with the relevant legislation,” Sushko says. “As privacy regulations constantly evolve and may contain stiff penalties for non-compliance, this role is gaining more and more attention on the job market.”
  • Penetration testers are specialists who essentially role-play as intruders, using “authorized simulated attacks against their own networks, Web servers and applications to find security flaws that hackers may be able to exploit,” Alexander says. These professionals compile detailed reports of risk areas and may help draft proposals for how to address the issues they find.

Do you have a future in cyber security?

What is cyber security? No matter how you define this evolving technology career, there’s no denying that it’s an important role in our digital society.

Organizations big and small rely on cyber security professionals to keep users safe from cyberattacks. Find out if you have what it takes to work in this field by checking out our article “8 Signs You’re Wired for Working in a Cyber Security Career.”

1“A history of Internet security”, Washington Post, May 30, 2015. [accessed September 2019].
2Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, [accessed August, 2019] www.bls.gov/ooh/. Information represents national, averaged data for the occupations listed and includes workers at all levels of education and experience. Employment conditions in your area may vary.

About the author

Ashley Brooks

Ashley is a freelance writer for Collegis education who writes student-focused articles on behalf of Rasmussen University. She believes in the power of words and knowledge and enjoys using both to encourage others on their learning journeys

female writer

Related Content

Related Content

This piece of ad content was created by Rasmussen University to support its educational programs. Rasmussen University may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen University does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen University is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

logo-accreditation-acen logo-accreditation-ccne chart-credential-laddering-associates-bachelors-masters 0 Credits 90 Credits 180 Credits 48 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE Start Here MASTER'S DEGREE PURSUERS End Here BACHELOR'S DEGREE End Here MASTER'S DEGREE chart-credential-laddering-associates-bachelors 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 90 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 180 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-msn chart-credential-laddering-nursing-programs chart-credential-laddering-nursing DNP MSN RN to BSN LPN to RN Bridge Accelerated BSN Professional Nursing ADN Practical Nursing Diploma Pre-Licensure Post-Licensure icon-colored-outline-bank icon-colored-outline-certificate icon-colored-outline-circle-dollar-sign icon-colored-outline-folder-search icon-colored-outline-hand-heart icon-colored-outline-head-blocks icon-colored-outline-head-cog icon-colored-outline-head-heart icon-colored-outline-health-plus-leaves icon-colored-outline-hospital icon-colored-outline-lifelong-learning icon-colored-outline-light-bulb-analytics icon-colored-outline-location-pin icon-colored-outline-magnifying-glass icon-colored-outline-monitor-healthcare icon-colored-outline-monitor-paper-search icon-colored-outline-nurse-rays icon-colored-outline-padlock-shield icon-colored-outline-person-presenter-screen icon-colored-outline-scales ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-colored-advance icon-colored-arrows-cross-curve icon-colored-briefcase-star icon-colored-build icon-colored-bulb-analytics icon-colored-certificate icon-colored-continual-development icon-colored-duo-chatbox icon-colored-folder-mortarboard icon-colored-forward-ribbon icon-colored-gears-clock icon-colored-globe-pen icon-colored-growth icon-colored-hand-bubble icon-colored-hand-stars icon-colored-hands-gear icon-colored-head-blocks icon-colored-head-cog icon-colored-health-plus-leaves icon-colored-hospital-building icon-colored-laptop-cbe-skyscraper icon-colored-laptop-checkmark icon-colored-laptop-webpage icon-colored-location-map icon-colored-location-pin icon-colored-monitor-paper-scan icon-colored-mortarboard-dollar icon-colored-national icon-colored-people-chat-bubbles icon-colored-person-cheer-star icon-colored-person-laptop-checkboxes icon-colored-person-screen-instructor icon-colored-person-whiteboard icon-colored-phone-chatbox icon-colored-police-light icon-colored-prep icon-colored-presenter icon-colored-regional icon-colored-save-time icon-colored-shirt-hat icon-colored-skyscraper icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-triangle-arrow-up-plant icon-triangle-calendar-pencil icon-triangle-clock-rotating-arrows icon-triangle-display-gears icon-triangle-hand-right-speech-bubble icon-triangle-laptop-coding-brackets icon-triangle-mortarboard icon-triangle-paper-ribbon icon-triangle-person-cheer-star icon-triangle-person-juggle icon-triangle-triple-people-chat-bubble icon-modality-campus icon-modality-field icon-modality-online icon-modality-residential icon-arrow icon-bank icon-camera icon-filter icon-general-chart icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-hat icon-general-heart icon-general-laptop-building icon-general-laptop icon-general-leader icon-general-map icon-general-money icon-general-paperwork icon-general-people icon-general-phone icon-general-speak-out icon-head-heart icon-info-circle icon-mail-forward icon-mglass icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-scales icon-share-square-o icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-spinner icon-tag icon-testimonial-quotes icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-circle-arrow-down icon-util-circle-dot icon-util-language-switch icon-util-loading icon-util-open-window-link icon-util-pdf-link icon-util-refresh icon-util-x rebrand-arrows icon-social-facebook-colored icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram-colored icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p-colored icon-social-pinterest-p icon-social-twitter-colored icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play graduate-cap-star-coin hand-coin hand-heart nurse-stethoscope-rays card-send-smile person-yoga-pose suitcase-star