CYBERSECURITY Word Drop Journal 5

CYBERSECURITY

C: Cyber intrusion detection system.

Y: Yearly auditing security software.

B: Blocking attacks via firewall installation.

E: Engineering cybersecurity programs for organizations.

R: Resolving cybersecurity threats or breaches.

S: Securing open doors (vulnerabilities) in an organization

E: Examining business operations to see weak points.

C: Conducting a real world penetration test to see if the physical security is in check.

U: Understanding what went wrong in a system, and how to fix it.

R: Real-time technology software for easy viewing of what is happening.

I:   Installing new up to date technology for people and organizations.

T: Testing software and code for vulnerabilities.

Y: Yield measurement data services; the yield and effectiveness of the organization’s cybersecurity program.

Write Up:

As you can see above, cybersecurity can be broken down into many subcategories. With the world being so technologically advanced, the threats will become ever more advanced. There are many different types of services provided throughout the cybersecurity industry. For example, a technician can install new computers and hardware. This example may not seem like cybersecurity, but it is actually the front line battleground. The technician upgrading those systems is helping to participate in making a stronger cyber security setup for the organization. Not to mention, there are roles such as a cybersecurity engineer, who directly construct and design the way security should be depending on the organization. There are a multitude of opportunities throughout this sector, many of which are not often thought about, but very much important to keep our technology safe and secure.

Leave a Reply

Your email address will not be published. Required fields are marked *