Related occupations for task:
Plan, coordinate, and implement network security measures to protect data, software, and hardware.
||Information Security Analysts
- Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
- Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Modify computer security files to incorporate new software, correct errors, or change individual access status.
- Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
- Implement Web site security measures, such as firewalls or message encryption.
- Implement updates, upgrades, and patches in a timely manner to limit loss of service.
- Identify, standardize, and communicate levels of access and security.
||Telecommunications Engineering Specialists
- Implement or perform preventive maintenance, backup, or recovery procedures.
- Implement controls to provide security for operating systems, software, and data.
- Manage user access to systems and equipment through account management and password administration.
- Plan, coordinate and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
- Specify users and user access levels for each segment of database.
||Document Management Specialists
- Administer document and system access rights and revision control to ensure security of system and integrity of master documents.
See all 11 related occupations >>