Career Services: Cybersecurity Crossword

1234567891011121314
Across
  1. 4. The practice of protecting systems, networks, and programs from digital attacks
  2. 6. The process of verifying a user’s identity.
  3. 7. The process of converting data into a secret code to prevent unauthorized access.
  4. 9. A type of malware that locks or encrypts a victim’s files and demands payment for their release.
  5. 10. A security system that monitors and controls incoming and outgoing network traffic.
  6. 13. A simulated cyber attack to test a system’s security.
  7. 14. A tool that collects and analyzes security logs (Security Information and Event Management).
Down
  1. 1. A security process that requires two forms of verification also known as 2FA.
  2. 2. Protects devices like desktops, laptops, and mobile devices from cyber threats by implementing measures to prevent, detect, and respond to malicious activity.
  3. 3. A type of malware that secretly gathers information from a user’s device.
  4. 5. A person who gains unauthorized access to systems or networks.
  5. 8. Malicious software designed to damage or disrupt computer systems.
  6. 11. Software that detects and removes malicious programs from a computer.
  7. 12. A cybersecurity professional who tests systems for vulnerabilities to improve security.
  8. 13. A cyber attack where hackers trick people into revealing sensitive information through fake emails or websites.