Cybersecurity Careers
Across
- 4. The investigation and analysis of digital evidence after a cybercrime or attack.
- 6. A set of rules that devices follow to communicate across a network.
- 9. Malware that locks files or systems until money is paid to the attacker.
- 11. A professional who designs secure computer systems and cybersecurity strategies.
- 14. A professional who designs and builds secure computer systems and networks.
- 15. Following cybersecurity laws, rules, and industry standards.
- 16. A person responsible for managing and maintaining computer systems and networks.
- 17. The process of verifying a user's identity before granting access.
- 18. Software that secretly gathers information from a computer user.
- 19. Actions taken to stop cyberattacks before they happen.
- 20. Anything that could harm a computer system or steal information.
- 21. A security system that monitors and controls incoming and outgoing network traffic.
Down
- 1. The process of converting information into a secret code to protect data.
- 2. A person who examines systems and data to identify cybersecurity threats and protect information.
- 3. A cybersecurity professional who tests systems for weaknesses by simulating attacks.
- 5. Internet based storage and services used to save and access data online.
- 7. A cybersecurity professional who responds to and investigates cyberattacks.
- 8. The protection of personal and sensitive information from unauthorized access.
- 10. Software designed to detect and remove malicious programs from computers.
- 12. A cybersecurity expert who actively searches for hidden threats in systems and networks.
- 13. The process of identifying cyber threats or suspicious activity.