After software is written, it is their job to review the source code and list potential bugs and errors that may pose security threats.
What is Source Code Auditors?
To ensure security settings are running smooth and up to standard, a Security Auditor must do this to scan for any activity.
What is Design / Run (Special) Audits ?
Google Drive exists in this location.
What is the Cloud?
A series of numbers separated by periods that identifies a computer on a network.
What is IP Address?
These pieces of code are designed to disrupt, damage, or gain unauthorized access to a computer system.
What is Malware?
At a cyber crime scene, Gilbert is tasked with carefully handling evidence of a security breach for law enforcement to determine the cause of the breach.
What is Forensic Expert?
Security Managers must be able to do this with a team to enforce and regulate security policies to prevent and solve breaches.
What is Lead / Manage?
More than ever, we need to worry more about this due to the transition to the online environment.
What is Cyber Attacks?
Spotify, Instagram, and many others on your smartphone is an example of this.
What is Software?
A security system implemented onto computer systems to track incoming and outgoing network access.
What is a Firewall?
Their job is to simulate cyber attacks on a company's software code to stress test the security systems.
What is Penetration Testers?
Forensic experts must have this skill to explain and demonstrate evidences of cyber attacks, especially in a court setting.
What is Strong Speaking Skills?
Cybersecurity is a necessary field in today's technological world because it helps prevent hackers from stealing this.
What is Data/Information?
Using another person's social security number is an example of this.
What is Identity Theft?
A hospital has a separate server containing fake patient information to trick potential hackers.
What is a Honeypot?
This professional builds software solutions that will protect crucial information in the database from being leaked.
What is Security Engineer?
Cyber Heroes must ensure that these are up-to-date with new threats and new technology.
What is Protocol/Guidelines?
Jeff was able steal information to sell on the dark web by disguising himself up as a nurse without identification and talking his way through the receptionist.
What is Social Engineering?
These people use their skills ethically.
What is White Hat Hacker?
These make up the CIA Triad.
What is Confidentiality, Integrity, and Availability?
Joe discusses security measures with many clients and if they are satisfied with his proposal, he must install the necessary protections for a company.
What is Security Consultant?
A fundamental to being a Cryptographer is understanding complex calculations involving math and statistics to create this for encryptions and decryptions.
What are Algorithms?
Cybersecurity specialists use this hiding technique to protect communications between devices.
What is Encryption?
An exploit was found in a program.
What is a Bug / Glitch?
Mark is a top cybersecurity employee who has this to see top secret files that normal employees don't have access to.
What is Authorization?