Career Services: Cybersecurity Crossword
Across
- 4. The practice of protecting systems, networks, and programs from digital attacks
- 6. The process of verifying a user’s identity.
- 7. The process of converting data into a secret code to prevent unauthorized access.
- 9. A type of malware that locks or encrypts a victim’s files and demands payment for their release.
- 10. A security system that monitors and controls incoming and outgoing network traffic.
- 13. A simulated cyber attack to test a system’s security.
- 14. A tool that collects and analyzes security logs (Security Information and Event Management).
Down
- 1. A security process that requires two forms of verification also known as 2FA.
- 2. Protects devices like desktops, laptops, and mobile devices from cyber threats by implementing measures to prevent, detect, and respond to malicious activity.
- 3. A type of malware that secretly gathers information from a user’s device.
- 5. A person who gains unauthorized access to systems or networks.
- 8. Malicious software designed to damage or disrupt computer systems.
- 11. Software that detects and removes malicious programs from a computer.
- 12. A cybersecurity professional who tests systems for vulnerabilities to improve security.
- 13. A cyber attack where hackers trick people into revealing sensitive information through fake emails or websites.