Uses devices and processes to secure networks
Network Security
Emails, Photos, or texts that seem to be from a legitimate company with the intent of installing malicious malware
Phishing
Stole data from over 1 billion users in 2017
Yahoo
Harmful to software and designed to damage your system
Malware
Keeps stability on internal and external applications of organizations
Security Engineer
Securing the data on the cloud
Cloud Security
Takes advantage of vulnerabilities that are unknown or unidentified
Exploits
330 Million records were exposed through a glitch
The verifying process to make sure you are who you say you are
Authentication
Goes through and monitors data
Information Security Analyst
Managing the access and privileges for each user
Management
Using extortion techniques to block your access until you give what they ask
Ransomware
Experienced one of the worst breaches
Adobe
Designed to detect, prevent, and remove malicious infections
Antivirus
Designs security structures
Security Architect
Keeps information private and accessible to the user
Information Security
When a hacker cracks your password
Password attack
In 2016 it was made known that old information could be sold
Myspace
Controls all the incoming and outgoing network usage, and makes sure it isn't available to others
Firewall
Evaluates Cyber security techniques and plans IT architecture
Cyber Security consultant
Protects computer systems, applications, data, and digital assets that national security depends on
Terminal Security
Network of computers infected with malware that are all being controlled by the Botnet instructor
Botnet
Became public that personal details could be shared
Aadhaar
Codes used to protect information from hackers
Encryption
In charge of the day to day operations and cyber security systems
Security Administrator