top of page
Cybersecurity Foundations
"Participants complete a Cybersecurity exam covering general cybersecurity vocabulary and knowledge needed to execute tasks commonly performed by all levels of cybersecurity professionals. Using digital presentation software such as PowerPoint, Prezi, or Moovly, participants prepare a presentation, addressing a specific cybersecurity issue, to a group of hypothetical corporate board members (i.e., judges). Participants must explain the importance of cybersecurity and why it is essential that the organization invest in such measures. Semifinalists exhibit proficiency by recommending security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts."
For the Connecticut State Conference, this competition entails creating a presentation centered around this year's problem and presenting their solution on the day of the conference. There will be no written test. Only individuals (1) can participate.
Items required for submission:
USB with portfolio (containing all required items)
Completed book
2019-2020 Theme: Stark Industries recently had a data breach that affected their daily operations. It was discovered that the compromise was related to system administrator reusing the same password across multiple websites and computer systems. At the time of the breach, he did not having multi-factor authentication enabled on his work computer.
Explain the importance of why you shouldn’t reuse passwords and how multi-factor authentication could have prevented this breach. In addition, how would you address concerns from employees about having multiple passwords and having to deal with multi-factor authentication.
bottom of page