For the past decade cyber security has been a hotly debated topic regarding jobs in information technology. The key questions asked by information technology professionals concerns, which certifications are in demand and where can I find employment after training is completed. On May 19, 2014, the United States Department of Justice filed major indictments against five leading government Chinese officials for cyber stalking and hacking. The United States government by filing these charges officially admitted a major Internet cold war is in progress. Secretary of State Chuck Hagel is tripled his staff to combat this serious securities threat. As a cyber-securities professional, you can find work in this growing field because of the demand, which now exists. We will reprint the Fox news story below and follow it up with some suggestions regarding, which certifications will benefit you in this present environment.
DOJ brings cyber-espionage case against Chinese officials
The Justice Department on Monday announced a first-of-its-kind criminal cyber-espionage case against Chinese military officials, accusing them of hacking into major U.S. companies to steal trade secrets.
Prosecutors described the alleged crimes as "21st century burglary."
Attorney General Eric Holder and other federal law enforcement officials revealed the indictment Monday morning, accusing five Shanghai-based Chinese officials of targeting the U.S. nuclear power, metals and solar products industries. The alleged victims include major U.S. firms like Alcoa, Westinghouse and United States Steel.
Holder said the hackers were targeting a total of six American companies, stealing information deemed useful to companies in China, including state-owned firms. He stressed that the alleged hacking is far different than the type of intelligence gathering conducted by governments around the world, in that this involved cyber-espionage for the sheer purpose of gaining the commercial upper hand against U.S. businesses.
"This is a tactic that the United States government categorically denounces," Holder said. "This case should serve as a wake-up call to the seriousness of the ongoing cyberthreat."
The charges were described as the first such case brought against state actors. The specific charges relate to cyber-espionage and theft of trade secrets.
John Carlin, recently installed as head of the Justice's National Security Division, had identified the prosecution of state-sponsored cyberthreats as a goal for the Obama administration.
"For the first time, we are exposing the faces and names behind the keyboards in Shanghai used to steal from American businesses," he said Monday, accusing the Chinese officials of "stealing the fruits of our labor."
The charges are being brought in a federal court in Pittsburgh, Pa. Holder, who acknowledged the defendants have never set foot in the United States, was pressed Monday on whether there's any hope that the Chinese government would hand over the five officials charged in the indictment.
Holder said the "intention" is for the defendants to face the charges in a U.S. court, and he hopes to have Chinese government cooperation.
U.S. officials have accused China's army and China-based hackers of launching attacks on American industrial and military targets, often to steal secrets or intellectual property. China has said that it faces a major threat from hackers, and the country's military is believed to be among the biggest targets of the NSA and U.S. Cyber Command.
Last September, President Obama discussed cybersecurity issues on the sidelines of a summit in St. Petersburg, Russia, with Chinese President Xi Jinping.
White House spokesman Ben Rhodes said at the time that Obama had addressed concerns about cyber threats emanating from China. He said Obama told Xi the U.S. sees it not through the prism of security, but out of concern over theft of trade secrets.
In late March, Defense Secretary Chuck Hagel revealed that the Pentagon planned to more than triple its cybersecurity staff in the next few years to defend against Internet attacks that threaten national security.
Hagel's comments at the National Security Agency headquarters in suburban Washington came as he prepared to visit China.
"Our nation's reliance on cyberspace outpaces our cybersecurity," Hagel said at the time. "Our nation confronts the proliferation of destructive malware and a new reality of steady, ongoing and aggressive efforts to probe, access or disrupt public and private networks, and the industrial control systems that manage our water, and our energy and our food supplies."
Fox News' Shayla Bezdrob and The Associated Press contributed to this report.
What certifications will benefit you as an information technology professional?
There are three certifications, which are in high demand for those who want to work in cyber security. They are: the CompTIA Security+, The Certified Internet Systems Securities Professional/CISSP and the Certified Ethical Hacker. Companies needing employees with the capability to protect their data will look for people who hold these credentials.
ABCO Technology located at 6733 S Sepulveda Blvd. in Los Angeles offers classes for all three certifications mentioned above. Call us from 9 AM to 6 PM Monday through Friday at: (310) 216-3067. You can email us at:
info@abcotechnology.com
Join the Internet security industry today!
Check out our Reviews
ABCO Technology - Better Business Bureau
ABCO Technology - Yellow Pages
ABCO Technology - a computer training institute provides job training for all types of applications and software used in the real-world job environment. ABCO’s graduates are prepared to take on the challenges they will face in today’s job market. We endeavor to make our students employable in the field of IT as office managers, technicians, network administrators, developers, and webmasters. Our desire is to create value, earn trust, deliver results, exceed expectations, and empower people.
Subscribe to:
Post Comments (Atom)
1 comment:
The updated CompTIA Security+ course is recognised all over the globe for validation of basic-level of security skills and knowledge. It is widely used by organisations, security professionals/analysts and penetration testers.
Post a Comment