The university of tulsa Online Blog

Trending topics in the tu online community

Cyber Security

What Is Internet Security?

Written by: University of Tulsa   •  Jan 15, 2025

A cybersecurity professional reviews code on a bank of monitors.

What Is Internet Security?                     

A total of 92% of the world’s population has internet access via mobile networks, according to the World Economic Forum. A decade ago, such a statistic would seem impossible. Now, people everywhere have access to news, educational resources, and communication platforms that can help bring equity to every corner of the world.

However, the internet, like other innovations, is often a double-edged sword.

For extremist groups, belligerent governments, global crime syndicates, and individual criminals, the internet is the perfect place for deception and exploitation. For that reason, governments and private companies alike don’t just need physical security. They need internet security.

What is internet security exactly? What threats do internet security experts encounter? How can the right education and training lead to a career in this booming and increasingly important industry?

What Is Internet Security? An Exploration of Common Threats

Internet security is a subfield of cybersecurity primarily concerned with safeguarding online activities, information, and infrastructure. As more devices become interconnected through the Internet of Things (IoT), internet security breaches stand to cause much more harm than ever.

Perhaps the best way to understand what internet security is and why it’s important is to examine some of the most common security threats faced by internet-connected networks.

Phishing

In phishing attacks, cybercriminals send messages designed to look like official correspondence (emails, text messages, and even phone calls) from trusted sources. Most commonly, messages contain fraudulent links to websites where targets are asked to enter sensitive data, such as passwords, usernames, or bank information. Sometimes, emails will contain a link or an attachment that installs malware on a target’s computer.

Multiple types of phishing schemes exist. Whale phishing schemes prey on corporate executives and other high-value targets. Spear phishing targets a specific individual. However, many phishing schemes involve sending out communications en masse to elicit information from large groups of people. This information is often used to gain access to accounts or create more credible information for future phishing schemes.

Malware

Malware refers to any kind of malicious software installed on a device. In the context of internet security, malware is typically installed unknowingly by users who open attachments in phishing messages, visit malicious websites, or install malicious programs masquerading as helpful software.

As with phishing, different types of malware exist. Spyware monitors users’ activities to learn information, such as passwords. Ransomware takes over a machine or network, locking users out or destroying or sharing information unless a ransom is paid. There are even fileless malware programs that can operate without creating new files, making them much more difficult to detect.

Distributed Denial-of-Service Attacks

Some malware can install programs that disrupt the flow of traffic and information through an internet or intranet network. This kind of attack is called a distributed denial-of-service (DDoS) attack and can spread to other devices on a network.

During a DDoS attack, attackers can send requests to each infected device. When sent en masse, these requests can slow or completely halt normal network operations, denying regular users the ability to use anything connected to the network. During this time, cybercriminals can often bypass security protocols.

Injection Attacks

By remotely injecting code into a program, attackers can manipulate networks, devices, or programs. The goal is often to extract data, alter information, or gain access to restricted parts of a network. This is often made possible by existing vulnerabilities that informed attackers know how to exploit. It’s possible to carry out many types of injection attacks through an internet connection.

For example, during an operating system (OS) command injection attack, attackers can manipulate a device’s OS by exploiting requests submitted through a website. Server Side Includes (SSI) injection attacks allow hackers to exploit HTML files and web applications. Other kinds of injection attacks,  including SQL injection, buffer overflow, and XPath injection attacks, can occur through an internet connection.

The Massive Cost of Internet Security Threats

Internet-borne security threats can massively impact individuals and organizations. In 2023, the FBI’s Internet Crime Complaint Center (IC3) received over 880,000 complaints, a 10% increase from the previous year. The IC3 estimates that the financial losses caused by internet security breaches totaled over $12.5 billion in 2023 alone. A total of 34% of complaints involved phishing scams, making them the year’s most reported internet crime.

Internet Security in America’s Private Sector

Another common and costly form of internet security attack is one that specifically targets businesses: business email compromise (BEC).

BEC is a particularly sophisticated type of phishing scheme in which cybercriminals obtain access to email addresses from legitimate companies. Posing as business representatives or third-party vendors, cybercriminals then request or divert large sums of money or obtain sensitive personal information, such as tax documents. The IC3 reports that this kind of fraud caused more than $2.9 billion in losses in 2023.

While businesses of all kinds are vulnerable to BEC and similar attacks, the Cybersecurity and Infrastructure Security Agency (CISA) says the country’s small businesses are three times more likely than larger companies to be targets. In 2021, CISA reports that small businesses lost a collective $2.4 billion to cybercrime — a devastating blow to early-career entrepreneurs and family business owners alike.

However, in some sectors, businesses stand to lose more than revenue. The American Hospital Association (AHA) reports that between January 2024 and October 2024, the nation’s health care companies were the victims of almost 400 cyber attacks. With patient data compromised, these organizations lost both revenue in the form of government fines and community trust. Breaches at finance, banking, and infrastructure maintenance firms can result in a similar loss in reputation, a loss that can be difficult to recover.

Careers in Internet Security

Given the potentially devastating costs of internet security breaches, organizations in every sector realize what internet security is worth and prioritize hiring experts on their teams. Many professionals work in the information technology (IT) and data security departments of health care providers, retailers, banks, and other private enterprises. However, there are also career opportunities in the government sector with agencies such as the FBI and CISA and with independent vendors who provide cybersecurity services to other organizations.

While internet and cybersecurity experts can take on any number of IT and data security roles, here are a few of the unique and often high-salaried job opportunities available to those with experience and advanced training.

Information Security Analyst

Information security analysts monitor their organizations’ networks for threats, set security protocols for users, and generally guide the information security policies. To help executives make informed decisions, they also research new security solutions and create reports on the status of an organization’s cybersecurity system. In the event of a successful attack, information security analysts focus on data recovery and service restoration.

According to the U.S. Bureau of Labor Statistics (BLS), information security analysts made a median salary of $120,360 as of May 2023. The highest earners made $180,370 or more.

Chief Information Security Officer

While information security analysts are often involved in the day-to-day affairs of an organization’s information security department, chief information security officers (CISOs) oversee organizational security strategy. Working with other C-suite executives, CISOs ensure that every department’s needs are met, allocate budgets, and keep stakeholders informed about all information security issues. They often work for large organizations that have multilevel security needs, government agencies, and technology companies.

As of November 2024, Payscale reports that the median salary for CISOs was about $178,260, with the top 10% making closer to $242,000. Like other C-suite executives, CISOs are often eligible for bonuses, profit sharing, and other forms of compensation.

Digital Forensic Examiner

Digital forensic examiners examine computer software, hardware, and networks to uncover the extent of a cyber attack or track the perpetrators. Not limited to investigating internet crimes, these professionals can aid in any investigation in which technology plays a crucial role, such as human trafficking, smuggling, and identity theft. Though digital forensic examiners often work for law enforcement agencies, such as the FBI, they can also work for third-party cybersecurity providers; regulatory agencies, such as the U.S. Securities and Exchange Commission (SEC); and large businesses, such as banks and investment firms, which are often the targets of fraud and cyber attacks.

Payscale reports that digital forensic examiners made a median salary of about $70,430 as of August 2024, with the highest earners making more than $103,000.

Network Security Architect

Network security architects are primarily responsible for designing cybersecurity systems. This often includes performing penetration tests, making upgrades based on the latest threats, and setting up the systems they design. They can be found working for government agencies, such as CISA, that guard infrastructure and government data; for cybersecurity solution providers; and for individual businesses in every sector.

Payscale reports that the median salary for network and IT security architects was about $143,390 as of December 2024. The highest earners reportedly make closer to $193,000. Those who work for third-party security firms often receive commissions in addition to their base salaries.

Penetration Tester

Helping organizations prepare for attacks is what internet security professionals of all kinds do. Penetration testers, or pen testers, play a central role by performing simulated attacks themselves. This requires deep knowledge of the latest cyber attack tactics and common vulnerabilities. Penetration testers also reverse engineer cyber attack software to discover its inner workings, make recommendations to administrators, and prepare security audits. While some penetration testers are part of a company’s in-house team, many work independently or with third-party security firms.

Payscale reports that the median salary for penetration testers was about $98,100 as of November 2024. The highest earners made around $146,000. Salaries can vary widely based on whether a pen tester works for an organization or as a freelancer.

Internet Security Job Outlook

While the U.S. Bureau of Labor Statistics (BLS) doesn’t report job outlook data for every internet and cybersecurity position, it predicts that positions for information security analysts as a whole will increase by an astounding 33% between 2023 and 2033. This is a considerably greater growth rate than the average 4% rate the BLS expects for all positions.

Considering how closely the job duties for information security analysts reflect the duties of similar positions, this indicates that professionals in the internet and data security sector are likely to find promising career opportunities in the coming years. As new threats emerge, there will likely be new career paths open to experienced professionals.

How to Prepare for a Career in Internet Security

While there are many possible career paths for internet security experts, many professionals take similar steps in their journey toward high-level roles. Typically, this journey starts with earning a bachelor’s degree and gaining some experience in entry-level IT roles. Then, professionals can earn a master’s degree in cybersecurity and take on high-level internet and cybersecurity leadership roles.

Step 1: Earn a Bachelor’s Degree

At the bachelor’s degree level, future internet security professionals often earn degrees in IT or cybersecurity. However, earning a degree in other computer science-related fields can also be helpful. For example, some students earn degrees in network engineering, software development, or database architecture.

Whatever the degree, computer science students typically take classes that can serve as a foundation for further training in the internet and cybersecurity. This includes classes on:

  • Programming and programming languages
  • Network architecture
  • Calculus
  • Statistics
  • Algorithms
  • Artificial intelligence (AI), machine learning, and other recent innovations

Many computer science degree programs also cover basic cybersecurity principles, such as internet safety and protocols. Students may also get the chance to minor in cybersecurity or complete an internship. 

However, many professionals earn degrees in fields other than computer science. Instead, they pivot to cybersecurity later in their careers by enrolling in master’s-level cybersecurity programs that teach both the fundamentals of the field and advanced security skills.

Step 2: Gain Experience in Entry-Level IT and Cybersecurity Roles

With a bachelor’s degree in computer science, students are often eligible for entry-level cybersecurity and more general IT roles. Available jobs are often determined by the degree a student earned at the bachelor’s level.

Early-career IT and cybersecurity jobs include the following:

  • Help desk technician
  • IT support specialist
  • Database administrator
  • Cybersecurity technician or engineer
  • Incident response engineer
  • Threat intelligence researcher

Experience in these roles can help students learn what internet security is in the context of a larger organization. Even in help desk and more general IT roles, future cybersecurity professionals can learn how to respond to and prevent common threats that today’s businesses face. At this point in their careers, some professionals pursue certifications in cybersecurity from schools and technology companies to expand their skills and prepare for management roles.

Step 3: Pursue a Master’s Degree for High-Level Cybersecurity and Internet Security Positions

Bachelor’s degree and certification programs can provide professionals with a broad yet highly adaptable skill set they can apply to many cybersecurity and internet security roles. However, to prepare for high-level positions, many choose to earn a master’s degree in cybersecurity.

Each program has a unique curriculum, but Master of Science (M.S.) in Cyber Security programs typically cover both the technical and leadership skills IT professionals need to manage an organization’s entire cybersecurity team. This can include courses on:

  • Cryptography
  • Security auditing
  • Penetration testing
  • Information security law and policy as it pertains to specific industries, such as health care and finance
  • Defensive cybersecurity measures

Many programs also include classes that prepare students to earn advanced professional certifications. Some positions, such as CISO or director of cybersecurity, may require additional work experience in advanced roles, but with the high-level skills master’s degree programs offer, professionals can take on numerous important roles after graduation. Professionals entering internet security in the government and law enforcement sectors may also have to complete employer-sponsored training.

Take Your Career in Internet and Cybersecurity to a Higher Level

While earning a master’s degree can prepare you for some exciting cybersecurity careers, making time for school while balancing a career can be difficult. Fortunately, the online M.S. in Cyber Security program at The University of Tulsa was designed with students like you in mind.

Being an accelerated program, students can earn their degrees in as little as 20 months. Furthermore, with both Leadership and Technical degree tracks, students can prepare for a wide range of high-level cybersecurity careers — even if they have little to no prior IT experience.

To find out more about your options, the curriculum, and why TU has been designated a Center of Academic Excellence in Cyber Defense by the National Security Agency (NSA) and the U.S. Department of Homeland Security (DHS) for over 20 years, reach out to the TU admissions team today.

Recommended Readings

How to Become an Ethical Hacker

Malware Analyst Career Overview

Network Security Overview: Definition and More

Sources:

American Hospital Association, “A Look at 2024’s Health Care Cybersecurity Challenges” \ Cybersecurity and Infrastructure Security Agency, “Accelerating Our Economy Through Better Security: Helping America’s Small Businesses Address Cyber Threats”

Cybersecurity and Infrastructure Security Agency, Security Architect

FBI, FBI Releases Internet Crime Report

FBI, Internet Crime Report 2023

IBM, Types of Cyberthreats

Payscale, Average Chief Information Security Officer Salary

Payscale, Average Digital Forensic Investigator Salary

Payscale, Average Penetration Tester Salary

Payscale, Average Security Architect, IT Salary

U.S. Bureau of Labor Statistics, Information Security Analysts

Learn more about the benefits of receiving your degree from The University of Tulsa

Get More Information