IN ONGOING EFFORTS TO ASSIST TECHNOLOGY AND ENGINEERING EDUCATORS IMPACTED BY THE COVID-19 SITUATION, THE MAY ISSUE OF THE ELEMENTARY STEM JOURNAL IS OPEN TO ALL AT NO COST.
Using Living Organisms to Investigate Fossils: A 6E Lesson Plan – Eric Worch, Emilio Duran, and Lena Duran
Honeybees and Humans – An Interconnected Existence – by Isma-ae Chelong, Johnny J Moye, DTE, and Cory M. Madison
Inclusion in the Classroom: Definitions, Populations and Best Practices – Dan Trent
STEM + C: Integrative STEM Learning Embedded With Cultural/Heritage Algorithms
STEM + C: Integrative STEM Learning Embedded With Cultural/Heritage Algorithms – Virginia R. Jones, DTE
Kids Code: Tools to Support Mathematical Precision Through Meaningful Connections – Kelley Buchheister
Making Wind Turbines – Tracy Young
Books to Briefs:
Anyone Can Engineer – Jana Bonds
Information Security Analysts – Virginia R. Jones, DTE
Meet Linda Harpine – Linda Harpine
Information Security Analysts
by Virginia R. Jones, DTE
The emerging STEM career of Ethical Hacker is also known as an Information Security Analyst. Their primary job is to plan and carry out security measures to ensure their company or organization is protected from outside threats to their networks and computer systems.
Ethical hacking became a career from companies’ desire to understand the threats and security issues that hackers could introduce into their computer systems to cause a shutdown or compromise the company's data, whether about the company itself or its customers. Hacking became prevalent as a “hidden danger” when computer systems automated many of the services companies offer. There are three generally recognized categories of hackers—white hat, gray hat, and black hat.
According to Tech Target (2020), the definition includes: “An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to penetrate a computer system, network, application, or other computing resource on behalf of its owners—and with their permission—to find security vulnerabilities that a malicious hacker could potentially exploit” (para 1). A white hat hacker is a “good” guy. This person has good intentions and follows all rules and regulations when checking out computer networks. This white hat person makes sure all regulations, rules, and laws are followed. An ethical hacker keeps a company ahead of threats and unwanted intrusions into their systems. This analyst uses a method called “pen tests” or penetration tests to break through the company’s firewalls and other methods of protection. These tests are routinely run to discover vulnerabilities or possible targets so that companies can develop protective measures—firewalls—to protect their sensitive data from outside threats. Ethical hackers often run “attacks” to understand where the possible weaknesses are and develop computer programs or countermeasures to protect against them. They are the first line of defense for most companies in protecting their systems.
Information Security Analysts usually have at least an associates degree or a bachelor’s degree in computer science, information technology, or a related field. Hackers also need to have a strong background in computer programming, especially multiple computer languages. There are also industry-recognized credentials such as Certified Ethical Hacker. This credential was developed in 2003 and has become one of the leading credentials recognized by the U.S. Department of Defense (EC-council, 2020).
Ethical hacking careers will continue to grow and expand in their scope and operations. According to Standards for Technological and Engineering Literacy Core Disciplinary Standards (ITEEA, 2020), the impacts, influences, and application and maintenance of technological products and systems are core criteria for defining technology and engineering STEM education.
Bureau of Labor Statistics, U.S. Department of Labor. (2020). Occupational outlook handbook, Information security analysts. Retrieved from www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
TechTarget.com. (2020). Retrieved from https://searchsecurity.techtarget.com/definition/ethical-hacker
EC-Council. (2020). Retrieved from www.eccouncil.org/ethical-hacking/
International Technology and Engineering Educators Association (ITEEA). (2020). Standards for technological and engineering literacy: The role of technology and engineering in STEM education, Core disciplinary standards. Reston, VA: Author (in progress).
Virginia R. Jones, Ph.D., DTE, Dean of Student Success and Enrollment Services at Patrick Henry Community College, is co-field editor of The Elementary STEM Journal and ITEEA President-Elect. She can be reached at firstname.lastname@example.org.
Quick Facts: Security Analysts
$98,350 per year/$47.28 per hour
If you are unable to login, you may need to update your Profile.
Go here for more information on how to update your profile to access your account in EbD-BUZZ.
If you are still unable to access your account after following these directions, contact
If you are not currently an EbD-Network School and need more information,
contact us at email@example.com
for a Network Agreement and any associated costs.