Cyber Careers
Skills
Terminology 1
Terminology 2
Terminology 3
100

Security specialists must ensure that this must be running properly for companies.

Security Tools

100

The use of techniques to protect data and systems from an attack is called?

Cybersecurity

100

This practice helps prevent hackers from stealing your data.

Cybersecurity

100

Converting information into secret code is?

Encryption

100

What is designed to disrupt, damage, or gain unauthorized access to a computer system.

Malware

200

At a cyber crime scene, Gilbert is tasked with carefully handling evidence. He is a _____.

Forensic Expert

200

Cyber criminals are able to perform cyber attacks on us because we are surrounded by?

Technology

200

More than ever, we need to worry more about this due to the transition to the online environment.

Cyber Attacks

200

Spotify on your iPhone is an example of?

Software

200

This refers to a network of remote servers where users can store data.

Cloud

300

_____ simulate cyber attacks on test code to test security.

Source Code Auditors

300

An incident respinder runs ____ to analyze potential risks.

Security tests

300

Google Drive exists in this location

Cloud

300

Using another person's social security number is an example of?

Identity Theft

300

A hospital has servers containing fake patient information to trick hackers. This is a(n)

Honeypot

400

Jenny works at a hospital to keep sensitive information safe. She is a _____.

Security Engineer

400

Forensic experts must have the following to convince the jury about their evidence.

Strong Speaking Skills

400

Jeff was able to enter a hospital by disuising himself up as a nurse without identification.

Social Engineering

400

A ____ uses their skills ethically.

White Hat Hacker

400

Who uses their skills to harm or damage computer systems?

Black Hat hacker

500

Joe must install physical protections of video surveilance and alarm systems for a company. He is a _____.

Security Consultant

500

Cyber Heroes must ensure that _____ are being up to date with new threats.

Protocols/Guidelines

500

We use this hiding technique to protect communication between devices.

Encryption

500

An exploit found in a program where a low-rank employee gains access to his boss's files is a

Bug

500

Mark is a cyber secuity employee who has clearance to top secret files that normal employees don't have access to.

Authorization