ePortfolio #5 – Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity

C – Create an app that scans the dark web and gives you an alert anytime your information is found

Y – Yaggi Atenna app for your phone

B – Bluesnarfing protection software for your home network

E – Encryption software that isn’t breakable by quantum computing

R – Remote backup software that that is secure and encrypted end to end

S – Server chassis that use biometrics to secure access to them and perform any work within

E – Exit nodes on the TOR network that are secure and can’t be geolocated

C – Create a programming language that won’t allow code to be compiled if not secure

U – UDP encryption that doesn’t affect performance

R – RAM that is intelligent enough to help protect against buffer overflow attacks

I – IP based surveillance systems that are undetectable, secure, and integrate with traditional SIEM systems

T – Threat intelligence service that is able to deliver actionable intelligence and integrate directly with the customers systems immediately

Y – YouTube service that anonymizes your viewing, allows access to all content, while ensuring top level privacy for viewers

Leave a Reply

Your email address will not be published. Required fields are marked *