Identify ICT security risks

Description

Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.

Alternative labels

model ICT threats
identify ICT security risks and threats

Skill type

skill/competence

Skill reusability level

sector-specific

Relationships with occupations

Essential skill

Identify ICT security risks is an essential skill of the following occupations:

Digital forensics expert: Digital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden, encrypted or damaged, in a forensic manner with the aim to identify, preserve, recover, analyse and present facts and opinions about the digital information.
ICT security consultant: ICT security consultants advise and implement solutions to control access to data and programs. They promote a safe exchange of information.

ICT disaster recovery analyst: ICT disaster recovery analysts develop, maintain, and implement ICT continuity and disaster recovery strategies and solutions. They support the technical teams, assess the risks, design and develop procedures, documentation and strategies for disaster recovery in order for business functions to continue and recover with a minimal loss of data. They also coordinate the system backups tests and validations.
Ethical hacker: Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vulnerabilities that may result from improper system configuration, hardware or software flaws, or operational weaknesses.
ICT resilience manager: ICT resilience managers research, plan and develop models, policies, methods, techniques and tools that enhance an organisation’s cyber security, resilience and disaster recovery.
Mobile devices technician: Mobile devices technicians carry out proper fault diagnosis to improve the quality of mobile devices and repair them. They provide information related to a number of services, including warranties and after-sale services.

Optional skill

Identify ICT security risks is optional for these occupations. This means knowing this skill may be an asset for career advancement if you are in one of these occupations.

ICT security manager: ICT security managers propose and implement necessary security updates. They advise, support, inform and provide training and security awareness and take direct action on all or part of a network or system.

Database developer: Database developers program, implement and coordinate changes to computer databases based on their expertise of database management systems.
IT auditor: IT auditors perform audits of information systems, platforms, and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. They evaluate ICT infrastructure in terms of risk to the organisation and establish controls to mitigate loss. They determine and recommend improvements in the current risk management controls and in the implementation of system changes or upgrades.

 


 

References

  1. Identify ICT security risks – ESCO

 

Last updated on September 20, 2022