Portfolio #5
Use the letters of the work CYBERSECURITY to list legal ways to make money in cybersecurity.
For example:
Create app that rate software
Yacht GPS software that is secured
C: Create a control access app to help monitor systems from remote location.
Y: Yearbook apps and software with access to only members of the year group.
B: Backup software and applications to securely save data for future use or in an event of an attack
E: Encryption and decryption applications for safe transmission of information between partners.
R: Risk assessment applications as a decision-making tool.
S: Secured data collection applications for projects.
E: E-business that provide security and Information professional services.
C: Campers with secured internet access applications.
U: Utilize NIST framework to develop and implement policy and firewall.
R: Recovery systems and remote connectivity application for secured servers.
I: Intrusion detection system apps to signal operators of possible intrusion.
T: Transmission modes (tablets, phones) and telecommunication apps for secured communications between technicians and representatives.
Y: Yacht with a secured firewall for business partners to conduct transactions at sea.