Information Security Analyst
From the Set Cool STEM Careers
A guide to what an information security analyst does and how to become one.
Interest Level | Grade 4 - Grade 8 |
---|---|
Reading Level | Grade 5 |
Dewey | 005.8023 |
Lexile | 1020L |
ATOS Reading Level | 7.1 |
Guided Reading Level | U |
Publisher | Cherry Lake Publishing |
Series | Cool STEM Careers |
Language | English |
---|---|
Available Formats | Reinforced book (9781624310058), Paperback (9781624310294), PDF (9781624310539), ePub (9781631884900), Hosted ebook (9781624310775), Kindle (9781631374920) |
Copyright | 2013 |
Number of Pages | 32 |
Dimensions | 7.5 x 9.5 |
Graphics | Full-color photographs |
Booklist -Information Security Analyst
The entry into the Cool STEM Careers series begins with a scene out of a suspense movie: an information security analyst helps track down a corporate spy searching for confidential information about a new product the corporation is developing. From there, Mara writes about both the content and the requirements of the job, making it clear that the best analysts constantly seek out shifts and developments in computers and other technology. Mara also states that it is a growing field, one that will require more expertise as computer hackers get more sophisticated. Mara also explains why some personality traits—including trustworthiness, patience, and excellent communication skills—are crucial to this career. Standard back matter includes a short list of well-known security analysts including—who knew?—Julius Caesar.
Author: Wil Mara
- Do You Want to Know a Secret?
- Getting the Job
- A Day in the Life
- Looking Ahead
- Some Well-Known Information Security Analysts
- Glossary
- For More Information
- Index
- About the Author
Author/Illustrator biography |
Glossary of key words |
Index |
Informative sidebars |
Reviewed |
Sources for further research |
Table of contents |
Full-color photographs |