Journal Entry # 5 – Legal ways to make money in [C-Y-B-E-R-S-E-C-U-R-I-T-Y]

Cyber Analytics Software
Y
ARA Malware Identification Rules Development and Implementation
B
oundary Protection Tools and Management (Firewalls, IPS/IDS, etc…)
R
isk Management (Controls)
S
ecurity Information and Event Management (SIEM)
E
nd Point Security Tools and Management(Antivirus, Data Loss Protection, etc…)
C
onfiguration Management
U
ser Activity Monitoring (UAM)
R
esponding to Cyber Incidents
I
nternet Protocol Address Management
T
raining and Education (Cybersecurity Awareness)
Y
early Asset Lifecycle Financial/Budget Planning

Leave a Reply

Your email address will not be published. Required fields are marked *