Page 11 - Cybersecurity Career Guide for UT Austin
P. 11

11
Driving Improvements
Time was, car problems originated in a car’s mechani-
cal parts. Now, cars depend on computers that let the
driver access smartphone apps, music from streaming
platforms, and navigation. Computers also control
autonomous sensors to protect the driver from unseen
threats. Since car computers must connect to a larger
network, they’re just as vulnerable to attack as your PC.
A consumer watchdog found that a malicious hacker
could cause as many as 3,000 deaths by disabling
braking, steering, and even airbags. One particularly
disturbing way to hack a car is a malware “worm” that
can hop from car to nearby car to shut off crucial sys-
tems and cause a wreck. And cybersecurity challenges
will only increase as driverless cars become more of a
reality. Technologies aimed to create a safer world for
the driver have opened up a Pandora’s box of threats
that cybersecurity experts must fight.
DID YOU KNOW?
1. Cybersecurity isn’t just coding and programming.
It’s also drafting and implementing cyber policies for
secure information exchange and storage. And cyber-
security is digital forensics for finding out how who did
what, where, and when, to stop cybercriminals in the
future. See page 36.
2. The most important skills for success in a cyber
job aren’t necessarily tech-related. Problem-solving,
communication skills, and teamwork are commonly
cited as being extremely important.
3. Cybersecurity thrives on diversity. Teams that
include individuals with diverse personal and academic
backgrounds benefit from the unique perspectives
brought by each member. This includes women and
minorities, who often offer valuable insights to cyber-
security teams due to their distinct viewpoints that can
differ from those of white men. See page 40.
FOR MORE MYTHS AND TRUTHS, SEE PAGE 54.
STUDY: AGENTS OF CHANGE: WOMEN IN THE INFORMATION SECURITY PROFESSION




























































   9   10   11   12   13