0% found this document useful (0 votes)
109 views21 pages

Cybersecurity Career Exploration

This document discusses exploring a career in cybersecurity. It begins by outlining why the author chose to research this field, noting their interests in computers, problem-solving, and relevant skills and values. It then describes a typical job as a cybersecurity analyst, including responsibilities, skills required, and average salary. Next, it details a sample day in this career, highlighting tasks like analyzing security systems, running tests, and interacting with clients. Both positives like competitive pay and negatives like potential 24/7 on-call status are reviewed. In conclusion, the author provides an overview of their research into this growing career path in cybersecurity.

Uploaded by

api-387924385
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views21 pages

Cybersecurity Career Exploration

This document discusses exploring a career in cybersecurity. It begins by outlining why the author chose to research this field, noting their interests in computers, problem-solving, and relevant skills and values. It then describes a typical job as a cybersecurity analyst, including responsibilities, skills required, and average salary. Next, it details a sample day in this career, highlighting tasks like analyzing security systems, running tests, and interacting with clients. Both positives like competitive pay and negatives like potential 24/7 on-call status are reviewed. In conclusion, the author provides an overview of their research into this growing career path in cybersecurity.

Uploaded by

api-387924385
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

1

RUNNING HEAD: CYBERSECURITY CAREER EXPLORATION

Cybersecurity Career Exploration

John E. Fox

Harrison High School

03 March 2021
2
CYBERSECURITY CAREER EXPLORATION

Chapter 1: Career Choice 3


Introduction 3
Job Description 4
A Day in The Life 5
A Day in The Life 7
Pros and Cons 8
Chapter 2: From Here to There 9
Professional Profile 9
Education 10
Budgeting 11
Chapter 3: Personal Assessment 12
My Skills 12
My Personality 13
My Motivation 14
Chapter 4: Productivity 16
My Project 16
Career Connection 18
References 20
3
CYBERSECURITY CAREER EXPLORATION

Chapter 1: Career Choice


Introduction

There are thousands of different careers in the country; some professions were created

yesterday, while others have been around since the country's creation. I chose to research a

relatively new career, cybersecurity. I initially decided on this career after a conversation with

my dad, a financial advisor, about one of his clients. His client works in cybersecurity, and we

discussed how the field is growing and that there is no fear of it going away. I began thinking

about cybersecurity and whether or not I wanted to do this career. Along with discussions with

my dad, another factor in my decision was the class computer science. I remembered taking the

class during my junior year, and I thoroughly enjoyed it. It was mainly basic level coding, but the

projects we coded throughout the course were very interesting. Thus, I decided to research the

career for my career exploration.

Through my research, I realized many aspects of this career intrigue me. The career takes

critical thinking and problem-solving skills, both of which are reasons math is my favorite

subject. It also involves computers and technology; I have always been interested in computers

and have never had a class about them that I didn't like. Some of my favorite courses, such as

graphic design and computer science, center around computers. I also discovered many values

that I share with the occupation. As I previously mentioned, problem-solving and critical

thinking are two of the values most important to the career, as well as diligence and

communication. I have learned through working during high school the importance of these two

values in any job.

I gained further interest in the career when, during my preliminary research, we

participated in a career interest assessment. Among the top of my careers of interest were
4
CYBERSECURITY CAREER EXPLORATION
architectural engineer, biofuels and biodiesel product managers, chemical engineers, and

computer and information system managers. Seeing careers in the computer science and

cybersecurity field cemented my belief that I have similar values and interests to the career.

Widening the scope, however, all of the careers shown are math-heavy engineering careers. The

results make sense being that math is my favorite subject. They all involve high levels of

communication, problem-solving skills, and critical thinking skills. All of the aspects of

cybersecurity that interested me were shared among these careers. At that point, I knew without a

doubt that cybersecurity would be the career that I researched.

Job Description

Throughout the field of cybersecurity, there are many different jobs that an individual

could have. One of the prominent careers in the field of cybersecurity would be a cybersecurity

analyst. Cybersecurity analysts are prevalent in both the private sector and public sector.

Companies need their data protected and often hire outside consulting companies or have their

own analysts to ensure security. The government also employs many analysts to protect the data

of the government and ensure privacy. A cybersecurity analyst works with companies, the

government, or individuals to monitor security access, perform tests and diagnostics, and identify

and solve security breaches. They also run "security audits" for companies to determine possible

weak areas in security. The average salary would be between $70,000 and $120,000 a year, as

well as many common benefits such as 401K matching and insurance. The job is a newer job,

and with the advancements in technology, it has and continues to grow rapidly. In cybersecurity,

there has been a 0% unemployment rate since 2011 (Professional Profile 1, 2021).

As with any job, there are many different skills required to be successful in the career.

Some of the most critical soft skills are communication, diligence, problem-solving, and
5
CYBERSECURITY CAREER EXPLORATION
organization. Hard skills associated with the job include knowledge of network information

systems and security, programming and coding, penetration testing, and a multitude of other

skills. There are also many personality traits that can help a person be successful throughout their

career in cybersecurity. There are traits that can help a person be successful in any job, such as

being hardworking and cooperative, as well as traits that are more specific to the career, such as

being intuitive and detailed oriented. While interviewing a man in the cybersecurity field, he

stated that one of the most beneficial traits is having a "natural curiosity" (Transcript A, 2021).

He discussed that one of the most important things is to simply have a thirst for knowledge.

Always ask questions and try to learn as much as you can about a topic. Natural curiosity will

not only make you more knowledgeable but will also show the people above you that you care

about your job and are putting in extra effort to do it correctly. However, skills can only get you

so far; certain requirements and expectations are also included in the job. A person in the job is

expected to not only have these skills but also be able to continuously use them to protect client's

data as well as possible. The job requires you to combine all of these skills into your daily

routine to be successful.

A Day in The Life

During an average day in cybersecurity, I could be doing many different things. As the

job mainly works with computers, I would mostly be in an office setting. I will be doing many

different things throughout the day. I will be preparing and analyzing security and network

systems for various clients and identifying weaknesses to strengthen security. I could be running

diagnostic tests or creating new protocols. I must perform these tasks well, and often as many

people rely on the company to secure their data. One mistake could lead to data being leaked or

stolen, so it is imperative to be diligent and thorough. However, the job is just as much about
6
CYBERSECURITY CAREER EXPLORATION
people as it is computers. The purpose of cybersecurity is to secure people's data. Most people in

cybersecurity work within a team as well. This means lots of interaction with people. It could be

meeting with the rest of your team or going to meet with clients or potential clients to discuss

their security needs. As Michael Kelley stated in his interview, "Normally on a Thursday, I

wouldn't be sitting here in the home office. Right. I would be out, um, visiting my, you know,

people or customers or our partners" (Transcript A, 2021).

Many aspects of the job intrigue me. I enjoy working with computers, but I also enjoy

talking to others, and I feel that I am a people person. I enjoy working in teams and cooperating.

However, I also enjoy the troubleshooting and problem-solving aspect associated with

cybersecurity. As I stated before, the job is just as much about people as computers, making it

stand out in my opinion. One very enticing factor of the job is the pay and benefits. While

discussing with Mr. Kelley, he stated, "a graduate coming out of Georgia Tech, you know, would

make over a hundred thousand dollars as a starting employee. And um, in addition to that and

have some stock compensation and all the benefits, it's pretty inviting" (Transcript A, 2021).

Along with the salary being very competitive, the job also comes with many benefits such as

401k matching.

As with everything in life, there are also negatives associated with the job.

One of the main negatives is a person has the potential to be on call throughout the day and

night. It's a very realistic situation that "you go home, leave the office and you go home, but you

know, at any minute you could be called into a problem, and you might have to stay overnight"

(Transcript B, 2021). I think that this is a definite negative to the job as it could cause stress.

However, it is necessary because criminals work at all hours of the day, and anyone could try to

hack into a company's or the government's networks at any time.


7
CYBERSECURITY CAREER EXPLORATION

A Day in The Life


During an average day in cybersecurity, I could be doing many different things. As the

job mainly works with computers, I would mostly be in an office setting. I will be doing many

different things throughout the day. I will be preparing and analyzing security and network

systems for different clients and identifying weaknesses to help strengthen security. I could be

running diagnostic tests or creating new protocols. I must perform these tasks well and often as

there are many people that rely on the company to secure their data. One mistake could lead to

data being leaked or stolen so it is very important to be diligent and thorough. However, the job

is just as much about people as it is computers. The purpose of cybersecurity is to secure

people’s data. Most people in cybersecurity work within a team as well. This means lots of

interaction with people. It could be meeting with the rest of your team or going to meet with

clients or potential clients to discuss their security needs. As Michael Kelley stated in his

interview “Normally on a Thursday, I wouldn't be sitting here in the home office. Right. I would

be out, um, visiting my, you know, people or customers or our partners” (Transcript A, 2021).

Many aspects of the job intrigue me. I enjoy working with computers, but I also enjoy talking to

others and I feel that I am a people person. I enjoy working in teams and cooperating. However, I

also enjoy the troubleshooting and problem-solving aspect associated with cybersecurity. As I

stated before the job is just as much about people as it is computers and that makes it stand out in

my opinion. One very enticing factor of the job is the pay and benefits. While discussing with

Mr. Kelley, he stated “a graduate coming out of Georgia tech, you know, would make over a

hundred thousand dollars as a starting employee. And um, in addition to that and have some
8
CYBERSECURITY CAREER EXPLORATION
stock compensation and all the benefits, it's pretty inviting,” (Transcript A, 2021). Along with

the salary being very competitive the job also comes with many benefits such as 401k matching.

As with everything in life, there are also negatives associated with the job.

One of the main negatives is a person has the potential to be on call throughout the day

and night. It's a very realistic situation that “you go home, leave the office and you go

home, but you know, at any minute you could be called into a problem and you might

have to stay overnight” (Transcript B, 2021). I think that this is a definite negative to the

job as it could cause stress. However, it is necessary because criminals work at all hours

of the day and anyone could try to hack into a company’s or the government’s networks

at any time.

Pros and Cons

There are many aspects, both positive and negative, that influence the career of

cybersecurity. Starting with the negative elements of the career, one of the main negatives of

this career would be the commitment required. As I previously stated, there are many times

throughout the job that a person would be on call or have to stay late. It could be “two in the

morning and then [you] get a phone call and [you] have to get back into work” (Transcript B,

2021). This is because a security breach could happen at any time throughout the day. Another

negative aspect is that it can be fairly stressful. Your job is to secure data and information for

companies, individuals and even the government. This can create a lot of stress as there are many

people depending on you and your work. This manufactures a lot of pressure for your work to be

perfect. Finally, the job is constantly evolving so it is very easy to become unfamiliar or out of

touch with new techniques. It is very important to stay up to date in the field because it is

constantly changing.
9
CYBERSECURITY CAREER EXPLORATION
However, I believe that the positive aspects outshine the negative aspects. First, the job

has one of the best outlooks of any careers as it does not only have no unemployment, but it also

is projected to continue its growth. Mr. Kelley said it best when he said, “we're growing like

crazy,” (Transcript A, 2021). The internet is not going anywhere, and everyone wants their

personal information to be safe. Another positive to the cybersecurity field is that there are many

different jobs and routes to go into the field. There are different focuses a person could have. For

example, at Georgia Institute of Technology there are 3 different bachelor's degrees that a person

can have to get a masters in cybersecurity. They can get a bachelor’s in computer science,

computer engineering, or public policy. Along with different paths to take there are also many

certifications one can get, some company specific, some for any company, that can help a person

stand out.

Chapter 2: From Here to There

Professional Profile
Throughout the career of cybersecurity, there are many things in which the professionals

of the career have in common. Certain personality traits and qualities a person could have would

influence them to pursue cybersecurity. As with many jobs, someone pursuing a career in

cybersecurity needs to be diligent and hardworking. However, this is even more so throughout

cybersecurity as there are new problems constantly arriving. Often, throughout a person’s career,

they will be on call and may have to come into work at any time of the day or week. More

specific to the job of cybersecurity, a person must be organized and detail-oriented. Much of the

job requires troubleshooting and solving problems. Many problems occur because of the tiniest

of details. It requires someone that is very detail-oriented and organized to work through the

whole system and identify potential issues and how to solve them. Finally, one of the most
10
CYBERSECURITY CAREER EXPLORATION
important traits a person can have would be the ability to work in a team. People in the career

often work in groups for specific tasks or clients. Working in a group requires a person to be

cooperative and communicative.

Along with personality traits many share in the job, some attributes can give one a leg up

over the rest. One of the most beneficial things one can be is to be personable and helpful. While

it may sound obvious, it is truly one of the most critical aspects of the job. Throughout

cybersecurity, a person will be dealing with their team and clients at all times. When asked what

qualities have aided the most throughout his career, Mr. Abernathy stated,” my top quality is I

can pretty much get along with anyone” (Transcript B, 2021). Through being personable, one

can set them apart from others in the job, which will allow them to move up through the field

faster.

Education

There are many different ways to enter the career of cybersecurity. However, all of them require

education. Many employers look for workers with a bachelor’s degree in cybersecurity or a

bachelor’s degree in computer science. Most colleges offer a bachelor’s degree in computer

science. While fewer colleges offer a bachelor’s degree in cybersecurity, many offer a master’s

degree. A person can take many different routes throughout schooling; as previously discussed, a

person at Georgia Tech can receive one of 3 different bachelor’s degrees and earn a master’s

degree in cybersecurity. Other than a degree in cybersecurity, there are certifications that can

help an individual stand out. While it is not required, many employers like to see potential

employees that have certifications. Some standard certificates are certified information systems

security professional (CISSP), certified information systems auditor (CISA), and certified
11
CYBERSECURITY CAREER EXPLORATION
information security manager (CISM). While these certifications are most common, there are

other certifications, including certifications geared towards specific companies.

Along with certifications, education throughout one’s career is almost as important as the

education received during one’s career. Cybersecurity is a field that is constantly evolving. New

technologies and procedures come out every day. It is vital to keep up with news on

cybersecurity and keep oneself well versed in new methods that may come about. Once you

obtain a job in cybersecurity, there are many different paths you can take within the field. The

field exists in multiple different ways. Your job could be working for the government, or you

could be a consultant for a company, or even work for the company itself. There are many

different careers, including network architects, security analysts. There are also companies where

you could go into the sales side of the business and sell your company’s work to other companies

or people. Cybersecurity is an expansive and ever-growing field, and this creates many different

options for education and advancement throughout one’s career.

Budgeting

Throughout life, there are always expenses that arise. Budgeting is essential so people

can afford their current arrangements and have the ability to save money for emergencies. While

researching this career, in “Professional Profile #4” I performed a budget analysis based on the

baseline salary. In the study, the assumed amount of student debt accumulated after college was

$22,350, and the baseline level salary was $58,430 before taxes. After performing this analysis

and through interviews, I believe it is most definitely worth entering this career. While a starting

salary of $58,000 is not stellar, it is still more than many jobs make and is enough for an

individual. Most importantly, in the career of cybersecurity, it is low risk, high reward. One of

the things everyone looks for in a job.


12
CYBERSECURITY CAREER EXPLORATION
First, despite $58,000 being a baseline salary, there is a lot of growth potential throughout

the field, giving this job a high reward. Michael Kelley discussed that “a graduate coming out of

Georgia Tech, you know, would make over a hundred thousand dollars” (Interview A, 2021).

Kelley’s statements accentuate a substantial amount of possible growth. There are also excellent

benefits that many companies offer that can help cut expenses allowing you to save more of your

salary, exemplifying the high reward nature of the career.

The other aspect that makes the job enticing is a low risk. As discussed previously, the

job has been growing and is projected to continue its growth in the foreseeable future. Along

with the growth, there has been a steady trend of 0% unemployment throughout the field, which

means more jobs present than people to fill them (Professional Profile #1). The excess of

employment creates a low-risk environment as you do not have a fear of not being able to find a

job for months after college or not being able to find one at all.

The state of the career in our country is very promising and has a high payoff when

pursuing this career throughout college. Based on the potential growth throughout the job and the

lower risk of going unemployed associated with this job than others, it is clear that going into

cybersecurity is much more than “worth it”.

Chapter 3: Personal Assessment

My Skills
I have previously discussed the skills necessary to not only succeed but excel in the field

of cybersecurity. Now I am going to focus on myself and the skills I possess and how they relate

to the field of cybersecurity. I believe one of the main skills I possess that relates to the career is

that I am detail-oriented and a good problem solver. These are very important in the field of

cybersecurity. Much of the job deals with solving problems in the network or discovering and
13
CYBERSECURITY CAREER EXPLORATION
stopping breaches. These take strong problem-solving skills, which I believe is one of my strong

suits. Secondly, many of these problems occur because of the smallest mistakes or oversights

within the network. A detail-oriented person is better suited to discover these problems and be

able to fix them in a timely manner. I believe that I am a detail oriented and observant person

which will help me throughout the career. Another strong suit of mine is that I am a strong

cooperator and communicator. I am very social and enjoy working in groups. This is helpful as

often in the career one would work with a group of analysts. However, I am not a perfect person,

and I know that. I have many weaknesses that I need to work on. A few weaknesses I have that

are related to this career are that I am not organized, and I am not a preplanner. This can create

problems as one needs to be very organized in order to have the ability to find problems that

could be happening in a clear and quick manner. While I am detail oriented once I start doing

something I am not very organized before I start something. This could cause problems.

Secondly, I am not the best planner. I have never really been one to plan things, I just go with the

flow. This can also generate problems as it is very beneficial to go into creating new procedures

for performing an audit with a plan. This ensures consistency and minimizes mistakes and

oversights. However, both of these weaknesses are something that I can work on and develop as

skills throughout college to set myself up for success in my career. While it is clear that I do not

possess all of the necessary skills and I do have some weaknesses. I believe that I have a strong

set of skills and can develop other skills which can help me on my path throughout my career.

My Personality

I believe that my personality goes very well with this career. I believe that I am

extroverted as well as levelheaded, and factual. These are all helpful to the career as there is lots

of cooperation and discussion with others throughout the field. It is important to be levelheaded
14
CYBERSECURITY CAREER EXPLORATION
as there can be a lot of pressure and stress associated with the job. Level-headedness can ensure

that my work is accurate and timely even in times of stress. I am also factual; I am a logical and

critical person, and this will help me to make educated and beneficial decisions as well as create

strong networks. These attributes are reinforced through my results in the Myers Briggs

personality test. Through the test, I discovered that my personality is ESTP-A. This means that I

am mostly extroverted, observant, thinking and prospective. Along with my personality, I have a

learning style that is beneficial to cybersecurity. I am more of a tactile learner; I learn best from

experience. This is beneficial in the field as many of the certifications and learning is based on

experience and being able to perform the actions necessary. Much of the career is also based in

math and technology, which lines up with the skills that I have in school. My best and favorite

subject in school is math. Computer science includes a lot of math which is beneficial to me.

Other classes which were favorites of mine included technology. Graphic design and Computer

science are two examples which rely heavily on using computers and programs to perform tasks.

Through my research I have discovered just how well this career and my personality match. In

“Reflective Assignment 4: SWOT Analysis” I took a career assessment. Computer system

analyst, network architects and computer systems information manager were among my top

matches. While learning more about this career, I have also discovered just how many

personality traits I have which can help me throughout the job. I believe this job is a great match

for me and I can lead a successful career in the field.

My Motivation
My motivation to enter this career has flourished as I have researched more about

cybersecurity. I began this research unsure about the career but I was interested and wanted to

discover more. Through the research I discovered how similar the aspects of the career, and my
15
CYBERSECURITY CAREER EXPLORATION
skills and interest were. This realization confirmed my interest in the career and has led to me

being very confident in this career. Since I am confident this is what I want to do it is now

important to look to the future. I am attending the Georgia Institute of Technology. In school I

will major in computer science and then proceed to major in cybersecurity. This could

potentially present a problem with the extra cost of gaining a master’s degree but I believe

through scholarships and work opportunities I should be able to overcome this obstacle. While

attending college there are many things I could do to gain experience in the field. Through

Georgia Tech they have Co-Op programs where I can work for a company in cybersecurity while

learning. This would give me on the job experience as a graduate and would help pay for school

as you get paid in the Co-Ops. After college there are many different companies that I could

work for. The larger companies that I could possibly end up working for would be Palo Alto

Networks, IBM, Microsoft and others. However, there are companies located throughout the US.

Depending on the company there is a chance I would need to move but I would not necessarily

have to move depending on the company I was hired at.

I have also developed many skills through this class and researching this career. I have

learned valuable research and self-evaluation skills. Assignment such as the SWOT Analysis

helped me identify weaknesses and things that I needed to work on. I also developed research

skills through researching many different topics throughout the semester. Along with the

research in the class we also performed a physical product. My physical product which I will

explain in the next chapter was heavily coding based. This helped reinforce the coding

experience which I had gained throughout high school. This class has not only provided me with

many opportunities to learn about cybersecurity but also many skills that can help me in my

future.
16
CYBERSECURITY CAREER EXPLORATION
Chapter 4: Productivity

My Project

Throughout the semester, I worked on a project related to the career I researched. After

weeks of brainstorming, I decided to create a game that could teach people about personal

cybersecurity and how to keep your information safe on the internet. The game combines coding,

which is a significant part of cybersecurity, and teaching people more about cybersecurity and

how they can protect themselves.

0- 1 Figure 4.2: Example of a question asked in game

To

create this

project, I

broke up

the 0-2 Figure 4.1: Beginning of the maze from a birds-eye view

work
17
CYBERSECURITY CAREER EXPLORATION
into stages. First, the design phase was the longest and most arduous step in creating my game.

However, it is also the most important. Without a functioning base code, there is no game. I

began the project by creating the main code for the game and testing it to ensure it functioned

properly. I used a program called Alice 3 which uses basic

programming to create games and animated movies. I

chose this program as I had previously had experience

with it in my computer science class. My project went

through two different designs. The original version was

more complex and had more moving parts. However, after

working on this design for some time, I realized that the game was too complex, and the Alice

program could not handle it. So, I shifted to what is now my final project. I simplified the

procedure to make sure that Alice could run it properly. While still a question-and-answer game,

the final design takes place in a maze. The simpler setting creates a much simpler design as there

are far fewer moving parts and background information being processed. Next, I moved on to the

research phase. I researched personal cybersecurity and techniques to keep data safe on the

internet. After studying different techniques, strategies, common scams, and other general info, I

began to design questions. I included a multitude of questions as the game draws randomly from

a pool of questions. After designing and researching, I moved onto the final stage of my game

implementation. During the design phase, I used placeholder questions for the procedure. After

my research, I inserted the questions into the procedure and then ran some final tests to ensure

effectiveness. This stage was relatively simple as I already had the structure of the code. I simply

copied the questions into the right areas of the code.


18
CYBERSECURITY CAREER EXPLORATION
The game functions mainly based on user input. When the game is started, there is a

message for the user to wait a few seconds. This delay provides

time for the game to boot up and ensure it runs properly. After

about ten seconds, the game will start, and the player can move

the data using the arrow keys. When the player enters an

intersection in the maze, a question will appear. The answers

will display a letter corresponding to a note on the keyboard,

that when pressed, will take the skeletons down a particular 0- 3 Figure
4.3: Code controlling
player movements using arrow keys
path of the maze. If the player chooses an incorrect answer,

they will hit a wall and see a sign telling them to restart. If the player is correct, they will

continue until they come to the next intersection, where the process will repeat. If they get all the

questions correct, they will enter a room that gives them a congratulatory statement. The user can

then exit the game or restart if they choose to play again.

The final game was mostly a success. The game has plenty of questions, so it rarely will

repeat questions in a single game and is easy to download off of the website I created for the

game. I have encountered zero problems in the downloading portion of the game. I have,

however, experienced a couple of minor issues with the product. As I previously stated, my

original project was very complex, and the Alice program had a hard time running the game.

While I did simplify the game, it is still quite complicated and can sometimes cause problems.

The majority of the time, the game will run smoothly; however, it will sometimes produce an

error statement from the Alice program due to its complexity. However, if this happens, it can

easily be solved by restarting the program in the top middle toolbar in the app.
19
CYBERSECURITY CAREER EXPLORATION
Career Connection
There are many different aspects from the career of cybersecurity from which I could

have drawn inspiration. I decided to create a game as it draws together a few various aspects of

cybersecurity. One of the most essential aspects of cybersecurity, as well as my project, is

coding. Throughout cybersecurity, workers need to create or analyze networks, introduce new

procedures or stop cyberattacks. All of these require extensive knowledge of coding. While

creating a game does not require as many skills as these professionals have, it still incorporates a

significant aspect of cybersecurity. Another aspect of cybersecurity that I incorporated into the

game is personal cybersecurity. Personal cybersecurity is something that not only cybersecurity

professionals deal with but every person that owns a phone, computer, or other piece of

technology. Another aspect I decided to include in my project is personal cybersecurity. I chose

personal cybersecurity for a couple of reasons. First, I wanted the game to be accessible to as

many people as possible. Personal cybersecurity is the most widespread topic in cybersecurity as

it applies to everyone. Second, people are generally horrible at personal cybersecurity. Studies

have shown that 59% of people will use the same password for almost all of their accounts

(Anderson 2018). With more people than ever having extensive computer knowledge and data

being less safe than ever, it is of utmost importance that people learn the best ways to protect

their data online. The importance of personal cybersecurity for everyone throughout the world

and the emphasis on coding throughout cybersecurity led me to create my personal cybersecurity

game.
20
CYBERSECURITY CAREER EXPLORATION
21
CYBERSECURITY CAREER EXPLORATION

References

Anderson, B. (2018, August 29). In the Age of the Data Breach, Why Do We Still Use Bad
Passwords? Security boulevard. https://securityboulevard.com/2018/08/in-the-age-of-
the-data-breach-why-do-we-still-use-bad-passwords/
Fox, J. (2021). Professional Profile #1 Career Overview [Unpublished manuscript]. Harrison

High School.

Fox, J. (2021). Professional Profile #3 Part 2 Transcript A [Unpublished manuscript]. Harrison

High School.

Fox, J. (2021). Professional Profile #3 Part 2 Transcript B [Unpublished manuscript]. Harrison

High School.

Fox, J. (2021). Professional Profile #3 Synthesis Matrix [Unpublished manuscript]. Harrison

High School.

Fox, J. (2021). Professional Profile #4 Post College Annual Budget [Unpublished manuscript].

Harrison High School.

Fox, J. (2021). Reflective Exercise #4 Self-Assessment with SWOT Analysis [Unpublished

manuscript]. Harrison High School.

Your Results. (n.d.). Free personality test, type descriptions, relationship and career advice

16Personalities. https://www.16personalities.com/profile

You might also like