cyber security engineer

1234567
Across
  1. 3. The systematic process of finding and fixing security holes in software or networks.
  2. 4. The act of gaining unauthorized access to computer systems to exploit vulnerabilities.
  3. 5. A process to determine and document potential threats to an organization
  4. 7. The analysis and examination of digital data for evidence or investigation.
Down
  1. 1. The method used to protect information by transforming it into an unreadable format
  2. 2. The response to and management of a security breach or attack.
  3. 6. The practice of securing information systems against unauthorized access and threats.