Journal Entry #5

Configure a network to only allow accepted MAC addresses

Yacht GPS software that is secure

Breaching a network to find vulnerabilities

Evaluating a system for potential errors

Risk assessments

Securing a system during a attempted attack

Enabling two-factor authentication

Cybersecurity engineering

Utilizing knowledge to

Reaching out to customers of your business after a security breach

Information security analysts

Tracking packets

Yearly re-certification classes in risk management

Leave a Reply

Your email address will not be published. Required fields are marked *