Skip navigation

Related Occupations for Task
15-1134.00 - Web Developers Bright Outlook

Related occupations for task:

Design and implement Web site security measures, such as firewalls or message encryption.

15-1122.00 Information Security Analysts   Bright Outlook Bright Outlook  
  • Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
  • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
  • Modify computer security files to incorporate new software, correct errors, or change individual access status.
  • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations.
15-1199.03 Web Administrators Bright Outlook
  • Implement Web site security measures, such as firewalls or message encryption.
  • Implement updates, upgrades, and patches in a timely manner to limit loss of service.
  • Identify, standardize, and communicate levels of access and security.
15-1142.00 Network and Computer Systems Administrators
  • Perform data backups and disaster recovery operations.
  • Configure, monitor, and maintain email applications or virus protection software.
  • Plan, coordinate, and implement network security measures to protect data, software, and hardware.
15-1143.01 Telecommunications Engineering Specialists Bright Outlook
  • Implement or perform preventive maintenance, backup, or recovery procedures.
  • Implement controls to provide security for operating systems, software, and data.
  • Manage user access to systems and equipment through account management and password administration.
15-1141.00 Database Administrators
  • Plan, coordinate and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.
  • Specify users and user access levels for each segment of database.

See all 11 related occupations >>