Hacking Types
Ways of Defending Hacks
Jobs
Companies
Famous Cyber People
100

Holding something against someone for a reward.

Ransomware

100

A network security system that monitors and controls incoming and outgoing network traffic.

Firewall

100

Typically work as part of a team to cover all the digital security needs of an organization.

Cyber Security Administrator

100

Security solutions, threat intelligence, infrastructure, and application delivery for enterprises and service providers for on-premises.

a10 networks

100

was an American computer security consultant, author, and convicted hacker.

Kevin Mitnick

200

Attackers use bad software such as spyware, viruses, ransomware.

Malware

200

A popular way to prevent cyberattacks, and it ensures data is only accessible to those who have the key.

encryption

200

A trained cyber professional who specializes in network and IT infrastructure security

Cyber Security Analyst

200

Includes data security, network security, advanced threat prevention, forensics, endpoint detection and response.

Checkpoint

200

 a British security blogger and the author of grahamcluley.com, a daily blog on the latest computer security news, opinion, and advice.

Graham Cluley

300

Hackers use basic information about users to guess their passwords.

Brute Force

300

Many social media, email, and financial accounts allow the use this.

Authentication 

300

Support, troubleshoot, and maintain computer servers and networks.

Data Systems Administrator

300

secures the most critical areas of risk, endpoints and cloud workloads, identity, and data, to keep customers ahead of today's adversaries and stop breaches.

CrowdStrike

300

A former security reporter at The Washington Post, Krebs has won industry-wide

Brian Krebs

400

Using a passive attack, a hacker can monitor the compute and network to gain some information.

Eavesdropping

400

Also known as an identity certificate or public key certificate, is a type of passcode.

Digital Certificate

400

A professional who is responsible for protecting computer systems, networks, and data from unauthorized access, theft, or damage.

Cyber Security Specialist

400

Helps connect and protect millions of customers globally.

Cloudflare

400

a Sydney-based software architect, web security specialist, and Microsoft MVP for seven years running.

Troy Adam Hunt

500

The hacker hits the most accessible physical point of the victim.

Waterhole

500

A passphrase as your password. Password breaches are a common way for hackers to gain access to accounts.

Security

500

Technology professionals keep the nation's computer networks and systems safe, defeat malware attacks, investigate major computer intrusions.

Special Agent ( FBI )

500

protects your internet traffic when you connect to your corporate network or to a public internet connection

Zscaler

500

a very well-known name in cyber security and IT, known for his pioneering work in computer security software

Eugene Kaspersky