Cybersecurity Careers

123456789101112131415161718192021
Across
  1. 4. The investigation and analysis of digital evidence after a cybercrime or attack.
  2. 6. A set of rules that devices follow to communicate across a network.
  3. 9. Malware that locks files or systems until money is paid to the attacker.
  4. 11. A professional who designs secure computer systems and cybersecurity strategies.
  5. 14. A professional who designs and builds secure computer systems and networks.
  6. 15. Following cybersecurity laws, rules, and industry standards.
  7. 16. A person responsible for managing and maintaining computer systems and networks.
  8. 17. The process of verifying a user's identity before granting access.
  9. 18. Software that secretly gathers information from a computer user.
  10. 19. Actions taken to stop cyberattacks before they happen.
  11. 20. Anything that could harm a computer system or steal information.
  12. 21. A security system that monitors and controls incoming and outgoing network traffic.
Down
  1. 1. The process of converting information into a secret code to protect data.
  2. 2. A person who examines systems and data to identify cybersecurity threats and protect information.
  3. 3. A cybersecurity professional who tests systems for weaknesses by simulating attacks.
  4. 5. Internet based storage and services used to save and access data online.
  5. 7. A cybersecurity professional who responds to and investigates cyberattacks.
  6. 8. The protection of personal and sensitive information from unauthorized access.
  7. 10. Software designed to detect and remove malicious programs from computers.
  8. 12. A cybersecurity expert who actively searches for hidden threats in systems and networks.
  9. 13. The process of identifying cyber threats or suspicious activity.