Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?

Preview:

Citation preview

Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?

CryptographersForensic AnalystsNetwork Security EngineersPenetration TestersMalware AnalystsDisaster Recover Experts

Use your immunity idol to pass on a question or challenge. You must surrender the idol once it is used.

Each time you get a question right, you get a challenge and a chance at bonus points.

You depend on the other tribes to vote for your

challenge solution. They will lose points for

teaming up unfairly.

The secret final challenge will be revealed at the end of the game for additional points.Good Luck CyberSurvivors!

What professional protects your day-to-day operations, data, and communications from tornados, hurricanes, power outages, and denial of service attacks?

A Disaster Recovery Expert

Name the critical responsibility of the disaster recovery expert that assures the Disaster Recovery Plan will work in an emergency.

This professional develops algorithms to protect communications from being read if intercepted.

A Cryptographer

Cryptographers are not only needed to protect our national secrets, these organizations and companies need encryption too.

This professional simulates attacks on developing applications, networked systems, and computers to simulate an attack by a criminal to help strengthen organizational security.

A Penetration Tester

These professionals are often unofficially called the “White Hat” version of these “Black Hat” criminals.

This processional configures the hardware, software, policy and end-user education of organizations to protect its digital assets.

Network Security Engineer

Which of the following three things is the biggest threat to an organizations security – hardware, software, employees?

This professional studies malicious software -- such as viruses, key loggers, and spyware – to understand how they function.

A Malware Analyst

Malware analysts can decompile malware’s compiled executable code to look at a representation of the source code. This helps them determine what the malware intends to do. This process is called…

This professional collects and analyzes data if a computer has been used in a crime.

A Forensic Analyst

The data the forensic analyst collects for law enforcement or litigation purposes can also be called…

What do Cybersecurity professionals protect?

Data and

Communications

A cyber attack by terrorists on our infrastructure could cause what kind of problems?

According to the National Workforce Center for Emerging Technologies, what percentage of Information Technology (IT) jobs are in corporations not specifically IT-focused (like healthcare, entertainment, banking, etc…)30%? 50%? Or 70%?

70%Source: http://www.nwcet.org/programs/cyberCareers/

Which degrees can work in Cybersecurity fields?Certificate? Associates? Bachelors? Masters? Doctorates?

A lot of cybersecurity jobs require that you be eligible for this classification. Hint: Top Secret

Security Clearance

Good reputation management can help a person get a security clearance. What are some things that you could do to keep a good reputation?

The team with the most ideas gets the point for this question.

Name as many other cybersecurity careers you can think of.

Teams get one point for every unique answer (answers that other teams don’t have on their list)

Information Security Crime InvestigatorForensics ExpertSystem, Network and/or Penetration TesterForensic AnalystIncident ResponderSecurity ArchitectMalware AnalystNetwork Security EngineerSecurity AnalystComputer Crime InvestigatorDirector of SecurityApplication Penetration TesterSecurity Operations Center AnalystProsecutor Specializing in Information Security CrimeTechnical Director and Deputy CISOIntrusion AnalystVulnerability ResearcherExploit DeveloperSecurity AuditorSoftware developerSoftware ArchitectDisaster Recovery ExpertBusiness Continuity AnalystCryptographerBioinformatics specialistRobotics

Recommended