Futaba _ Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Why Programming is Important for Cyber Security πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Today I am going to be handling one of the most TRIGGERING topics in Cyber Security. PROGRAMMING! Anti-Programmers Beware!!!!

People often feel there should be a motion for programming to become less relevant in Cyber Security because they never code on the job, and that it increases the barrier for entry way into Cyber Security, but they couldn't be more farther from the truth. I’m going to explain today why programming plays an important role in Cyber Security and why it’s important to learn how to code.

πŸŽƒ Article πŸŽƒ Glossary πŸŽƒ Catalog πŸŽƒ Home πŸŽƒ Search Mode

πŸŽƒ Article Glossary

πŸ•Έ Synopsis πŸ•Έ

Today I am going to be handling one of the most TRIGGERING topics in Cyber Security. PROGRAMMING! Anti-Programmers Beware!!!!

People often feel there should be a motion for programming to become less relevant in Cyber Security because they never code on the job, and that it increases the barrier for entry way into Cyber Security, but they couldn't be more farther from the truth. I’m going to explain today why programming plays an important role in Cyber Security and why it’s important to learn how to code.

πŸ•Έ Article Topics πŸ•Έ

I'll be discussing the following topics in order:

πŸŽƒ It makes Cyber Security more accessible

πŸŽƒ There would be no Security Updates/Fixes

πŸŽƒ You can build your own tools!

πŸŽƒ Programming teaches you how to critically think

You can click on any of the topics to simply check that one out if it interests you!

NOTE: Articles are read from LEFT to RIGHT via 2 columns! Read the first column all the way down and then move to the next one!

πŸ•Έ Key Links πŸ•Έ

Here's a quick run down on all the main links that are in the article in case you want to check them out first.

πŸŽƒ LinkedIn Version

πŸŽƒ Why Programming is important for Cyber Security

It makes Cyber Security more accessible πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Programming allows for Cyber Security to be more accessible, reducing the threshold of technical skills that are needed to enter Cyber Security.

What do I mean by this? Well for starters, any and all tools, whether it be for offense or defense, have already been built from the ground up for you by skilled PROGRAMMERS. This means that stuff like: splunk, SOAR, SIEM, NMAP, Metasploit, etc, stuff that makes your job a lot easier, and automated, rely on very skilled programmers to develop them.

This also applies to large scale security systems and vendors set in place that allow infrastructures to easily install and set up security systems seamlessly. This allows businesses that might not have the best knowledge and skill set for required security compliance to meet any and all needs to have a secure infrastructure. Take programming away and we loose all of that.

If programming were to become extinct, then the new usage of tools to fight Cyber Security threats becomes null and void. You’d have to build them from the ground up which would require EVERYONE to know programming. The only reason it’s becoming less required is because there already exist teams that focus on that for you, like Security Engineers for example.

What is a Security Engineer? Well, as the name would suggest, they help design and implement various security measures within software and system infrastructures. They also implement secure coding practices in order to patch any and all vulnerabilities that might exist in software, as well as implement new measures for ongoing projects. They play a CRUCIAL role in the overall landscape of security threats.

There would be no Security Updates/Fixes πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

If you take away programming from Cyber Security, then who is supposed to patch and implement version control and new security fixes each time there is a major breach? I’m waiting………??? HELLOOOO????

This makes sense as the overall process for FDE is to enumerate THE ENTIRE file system ENTIRELY and encrypt EVERY single file on the system. Asymmetric would be too slow for this as it's a slower encryption standard. It's also commonly used in mobile device data encryption as well for the same reasons.




You can build your own tools! πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

I think one of the biggest advantages to being able to program is that you can design your own custom tools. All the stuff I’ve shown you so far from previous articles are all custom made by me. I have fine tune control of what I need my tools to do.

Programming your own tools also allows you to bypass security systems via obfuscation and evolve them if you are on the more offensive side of things.

Programming teaches you how to critically think πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Programming teaches you how to think more logically and TRULY understand what goes on under the hood behind the tools that you use on a regular basis, making you more effective with them. There’s a difference between using a port scanner, and understanding what a port scanner is. Most know how to use the tool, but many don’t understand it. Another analogy for this is people that know how to use a computer but have ZERO technical skills with one. Does it make sense?


If you enjoyed this post give it a thumbs up! I’ll be keeping track of whose reacting from now on as there is a β€œspecial” reason for it. Just know the more you support my content the more there is in stored!


- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

portfolio img

πŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States