Presentation is loading. Please wait.

Presentation is loading. Please wait.

Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?

Similar presentations


Presentation on theme: "Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?"— Presentation transcript:

1

2 Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?

3 Cryptographers Forensic Analysts Network Security Engineers Penetration Testers Malware Analysts Disaster Recover Experts

4 Use your immunity idol to pass on a question or challenge. You must surrender the idol once it is used.

5 Each time you get a question right, you get a challenge and a chance at bonus points.

6 You depend on the other tribes to vote for your challenge solution. They will lose points for teaming up unfairly.

7 The secret final challenge will be revealed at the end of the game for additional points. Good Luck CyberSurvivors!

8 What professional protects your day-to-day operations, data, and communications from tornados, hurricanes, power outages, and denial of service attacks?

9 A Disaster Recovery Expert

10 Name the critical responsibility of the disaster recovery expert that assures the Disaster Recovery Plan will work in an emergency.

11 This professional develops algorithms to protect communications from being read if intercepted.

12 A Cryptographer

13 Cryptographers are not only needed to protect our national secrets, these organizations and companies need encryption too.

14 This professional simulates attacks on developing applications, networked systems, and computers to simulate an attack by a criminal to help strengthen organizational security.

15 A Penetration Tester

16 These professionals are often unofficially called the “White Hat” version of these “Black Hat” criminals.

17 This processional configures the hardware, software, policy and end-user education of organizations to protect its digital assets.

18 Network Security Engineer

19 Which of the following three things is the biggest threat to an organizations security – hardware, software, employees?

20 This professional studies malicious software -- such as viruses, key loggers, and spyware – to understand how they function.

21 A Malware Analyst

22 Malware analysts can decompile malware’s compiled executable code to look at a representation of the source code. This helps them determine what the malware intends to do. This process is called…

23 This professional collects and analyzes data if a computer has been used in a crime.

24 A Forensic Analyst

25 The data the forensic analyst collects for law enforcement or litigation purposes can also be called…

26 What do Cybersecurity professionals protect?

27 Data and Communications

28 A cyber attack by terrorists on our infrastructure could cause what kind of problems?

29 According to the National Workforce Center for Emerging Technologies, what percentage of Information Technology (IT) jobs are in corporations not specifically IT-focused (like healthcare, entertainment, banking, etc…) 30%? 50%? Or 70%?

30 70% Source: http://www.nwcet.org/programs/cyberCareers/ http://www.nwcet.org/programs/cyberCareers/

31 Which degrees can work in Cybersecurity fields? Certificate? Associates? Bachelors? Masters? Doctorates?

32 A lot of cybersecurity jobs require that you be eligible for this classification. Hint: Top Secret

33 Security Clearance

34 Good reputation management can help a person get a security clearance. What are some things that you could do to keep a good reputation? The team with the most ideas gets the point for this question.

35 Name as many other cybersecurity careers you can think of. Teams get one point for every unique answer (answers that other teams don’t have on their list)

36 Information Security Crime Investigator Forensics Expert System, Network and/or Penetration Tester Forensic Analyst Incident Responder Security Architect Malware Analyst Network Security Engineer Security Analyst Computer Crime Investigator Director of Security Application Penetration Tester Security Operations Center Analyst Prosecutor Specializing in Information Security Crime Technical Director and Deputy CISO Intrusion Analyst Vulnerability Researcher Exploit Developer Security Auditor Software developer Software Architect Disaster Recovery Expert Business Continuity Analyst Cryptographer Bioinformatics specialist Robotics


Download ppt "Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?"

Similar presentations


Ads by Google