Download presentation
Presentation is loading. Please wait.
Published byAugustus Harrell Modified over 9 years ago
2
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
3
Cryptographers Forensic Analysts Network Security Engineers Penetration Testers Malware Analysts Disaster Recover Experts
4
Use your immunity idol to pass on a question or challenge. You must surrender the idol once it is used.
5
Each time you get a question right, you get a challenge and a chance at bonus points.
6
You depend on the other tribes to vote for your challenge solution. They will lose points for teaming up unfairly.
7
The secret final challenge will be revealed at the end of the game for additional points. Good Luck CyberSurvivors!
8
What professional protects your day-to-day operations, data, and communications from tornados, hurricanes, power outages, and denial of service attacks?
9
A Disaster Recovery Expert
10
Name the critical responsibility of the disaster recovery expert that assures the Disaster Recovery Plan will work in an emergency.
11
This professional develops algorithms to protect communications from being read if intercepted.
12
A Cryptographer
13
Cryptographers are not only needed to protect our national secrets, these organizations and companies need encryption too.
14
This professional simulates attacks on developing applications, networked systems, and computers to simulate an attack by a criminal to help strengthen organizational security.
15
A Penetration Tester
16
These professionals are often unofficially called the “White Hat” version of these “Black Hat” criminals.
17
This processional configures the hardware, software, policy and end-user education of organizations to protect its digital assets.
18
Network Security Engineer
19
Which of the following three things is the biggest threat to an organizations security – hardware, software, employees?
20
This professional studies malicious software -- such as viruses, key loggers, and spyware – to understand how they function.
21
A Malware Analyst
22
Malware analysts can decompile malware’s compiled executable code to look at a representation of the source code. This helps them determine what the malware intends to do. This process is called…
23
This professional collects and analyzes data if a computer has been used in a crime.
24
A Forensic Analyst
25
The data the forensic analyst collects for law enforcement or litigation purposes can also be called…
26
What do Cybersecurity professionals protect?
27
Data and Communications
28
A cyber attack by terrorists on our infrastructure could cause what kind of problems?
29
According to the National Workforce Center for Emerging Technologies, what percentage of Information Technology (IT) jobs are in corporations not specifically IT-focused (like healthcare, entertainment, banking, etc…) 30%? 50%? Or 70%?
30
70% Source: http://www.nwcet.org/programs/cyberCareers/ http://www.nwcet.org/programs/cyberCareers/
31
Which degrees can work in Cybersecurity fields? Certificate? Associates? Bachelors? Masters? Doctorates?
32
A lot of cybersecurity jobs require that you be eligible for this classification. Hint: Top Secret
33
Security Clearance
34
Good reputation management can help a person get a security clearance. What are some things that you could do to keep a good reputation? The team with the most ideas gets the point for this question.
35
Name as many other cybersecurity careers you can think of. Teams get one point for every unique answer (answers that other teams don’t have on their list)
36
Information Security Crime Investigator Forensics Expert System, Network and/or Penetration Tester Forensic Analyst Incident Responder Security Architect Malware Analyst Network Security Engineer Security Analyst Computer Crime Investigator Director of Security Application Penetration Tester Security Operations Center Analyst Prosecutor Specializing in Information Security Crime Technical Director and Deputy CISO Intrusion Analyst Vulnerability Researcher Exploit Developer Security Auditor Software developer Software Architect Disaster Recovery Expert Business Continuity Analyst Cryptographer Bioinformatics specialist Robotics
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.