Journal Entry #5

C-create affordable yet effective protective software for the average person to purchase

Y-Youth training program in teaching young teens that are interested in cybersecurity

B- Become a cybersecurity expert for a corporate business

E- Encryption services for high profile personalities(celebs)

R-Restoring files or lost information, for victims of a cyber attack

S-Self Recognition as an authentication method

E-Extortion prevention online

C- Child Pornography detection

U-Unauthorized online access detection

R-Recovery of lost passwords, passkeys, and emails.

I- Insurance fraud prevention

T-Tracking cybercriminals by creating a digital footprint

Y- Yearly upgrading technology for major businesses

Leave a Reply

Your email address will not be published. Required fields are marked *