According to people in this career, the main tasks are...
| Task | Importance |
|---|---|
| Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. | 88% |
| Monitor current reports of computer viruses to determine when to update virus protection systems. | 84% |
| Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers. | 83% |
| Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures. | 82% |
| Modify computer security files to incorporate new software, correct errors, or change individual access status. | 81% |
| Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations. | 81% |
| Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated. | 80% |
| Document computer security and emergency measures policies, procedures, and tests. | 78% |
| Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. | 78% |
| Monitor use of data files and regulate access to safeguard information in computer files. | 77% |
| Coordinate implementation of computer system plan with establishment personnel and outside vendors. | 77% |
| Train users and promote security awareness to ensure system security and to improve server and network efficiency. | 76% |