E-Portfolio #5

Use the letters of the word CYBERSECURITY to list legal ways to make money in cybersecurity. 

Create a program that allows encoding to occur when needed 

Yacht GPS software that is secure

Biometric tooling to help detect interfering 

Extraordinary hacking detectors that reduce threats

Reconstruct methods of preparation of attacks

Securing data and information during an attack 

Elaborate on the importance of understanding 

Creating a program to detect the slightest bit of illegal activity 

Uninstall software that can cause harm and install more secure programs

Recognize when a threat is occurring before it’s too late

Initiate a program that allows specific access 

Trace any evidence to the attacker

Young adults must become knowledgeable to understand the possible threats that may occur

Leave a Reply

Your email address will not be published. Required fields are marked *