Security specialists must ensure that this must be running properly for companies.
Security Tools
The use of techniques to protect data and systems from an attack is called?
Cybersecurity
This practice helps prevent hackers from stealing your data.
Cybersecurity
Converting information into secret code is?
Encryption
What is designed to disrupt, damage, or gain unauthorized access to a computer system.
Malware
At a cyber crime scene, Gilbert is tasked with carefully handling evidence. He is a _____.
Forensic Expert
Cyber criminals are able to perform cyber attacks on us because we are surrounded by?
Technology
More than ever, we need to worry more about this due to the transition to the online environment.
Cyber Attacks
Spotify on your iPhone is an example of?
Software
This refers to a network of remote servers where users can store data.
Cloud
_____ simulate cyber attacks on test code to test security.
Source Code Auditors
An incident respinder runs ____ to analyze potential risks.
Security tests
Google Drive exists in this location
Cloud
Using another person's social security number is an example of?
Identity Theft
A hospital has servers containing fake patient information to trick hackers. This is a(n)
Honeypot
Jenny works at a hospital to keep sensitive information safe. She is a _____.
Security Engineer
Forensic experts must have the following to convince the jury about their evidence.
Strong Speaking Skills
Jeff was able to enter a hospital by disuising himself up as a nurse without identification.
Social Engineering
A ____ uses their skills ethically.
White Hat Hacker
Who uses their skills to harm or damage computer systems?
Black Hat hacker
Joe must install physical protections of video surveilance and alarm systems for a company. He is a _____.
Security Consultant
Cyber Heroes must ensure that _____ are being up to date with new threats.
Protocols/Guidelines
We use this hiding technique to protect communication between devices.
Encryption
An exploit found in a program where a low-rank employee gains access to his boss's files is a
Bug
Mark is a cyber secuity employee who has clearance to top secret files that normal employees don't have access to.
Authorization