22 - 27 August 2019

Cyber Security

Information security analysts work to protect an organization’s computer systems networks, to prevent hackers from accessing and/or stealing sensitive information and data. They are often employed by IT service providers, banking and financial services, government agencies and healthcare companies.

The job of information security analysts typically involves installing firewalls and data encryption software to protect confidential information. They monitor their organization’s network for security breaches and investigate a violation when one occurs. Information security analysts are also often involved in designing and executing their organization’s disaster recovery plan, which describes the steps and procedures to restore proper function of an organization’s IT systems and networks after an attack. Information security analysts must keep themselves up-to-date to stay one step ahead of potential cyber-attackers. They need to keep abreast of the latest methods attackers are using to infiltrate computer systems, as well as new security technologies that can help their companies counter these threats.

The recent years have witnessed an explosive growth of online business transactions, as well as rapid adoption of Internet of Things (IoT) and cloud computing. Coupled with security threats that continue to grow in complexity and frequency, cyber security professionals are now in great demand globally.

Learn more Learn less

Presented by

Competitors and results

Viktor Legostaev

Russia

749

Dmitrii Titov

Russia

749

Zitong Xiao

China

745

Zhutian Feng

China

745

Raissa Marcon Constante

Brazil

713

Jean Carlos Nicoletti Novak

Brazil

713

Devesh Logendran

Singapore

713

Chan Hong Koh

Singapore

713

Fun facts

“Brain” is the name of the first computer virus. It caused the computer virus epidemic in the USA in 1986. Originally, it was created as a programme for tracking “pirate” software copies.

80% of all network information security incidents occur from within an enterprise.

As a rule, software updates contain various tools of protection against upcoming potential threats to your device or computer.

Two-factor authentication (for example, via SMS) offers a higher level of security for your data than a complex password.

What happens during a skill competition?
1
Competitors receive a test project
2
Competitors execute a test project and deliver a complete/incomplete work by a stated deadline
3
A group of Experts assesses competitors’ test projects in accordance with WSI standarts
4
Results are calculated via information system and a list of winners is generated
5
Winners are awarded during a Closing Ceremony

Partners

Downloads

For more specific information about the skill please go to the Member Area.