What professional hackers do

Katie Ritchie Katie.lexchron@gmail.com Tech Talk
Posted 10/7/21

Who foils cyberthreateners?

In Tech Talk, we focus usually on how we can protect ourselves.

The goal is to protect our families from those who try to steal our information or do us harm.

This item is available in full to subscribers.

Subscribe to continue reading. Already a subscriber? Sign in

Get 50% of all subscriptions for a limited time. Subscribe today.

You can cancel anytime.
 

Please log in to continue

Log in

What professional hackers do

Posted

Who foils cyberthreateners?

In Tech Talk, we focus usually on how we can protect ourselves.

The goal is to protect our families from those who try to steal our information or do us harm.

In honor of Cybersecurity Awareness Month, lets take a peek at experts who protect us from identity theft, data breaches and other threats.

• Computer forensics investigators help law enforcement process evidence from crime scenes. These investigators retrieve digital evidence, data from damaged or corrupted systems. They get information from devices locked with an unknown password.

• Computer security incident responders are often 1st to respond to cybersecurity incidents. Their role is incredibly fast-paced. They determine if the incident is an attack or breach and resolve the issue. Cyber incident handling is not for the faint of heart!

• Cryptanalysts and cryptographers are different. Cryptographers are the code makers who help organizations protect their valuable data with encryption codes.

Cryptanalysts are code breakers for government intelligence x– spies – and law enforcement. They break the encryption codes used by bad guys. This lets government agencies know what they are up to and respond accordingly.

Next week I’ll share more about these roles. Maybe someone you know will want to join this rapidly growing field.

Imagine how technology might change by the time your children or grandchildren are choosing what to study in college.

Comments

No comments on this item Please log in to comment by clicking here