Across
- 2. / A field that focuses on protecting computer systems, networks, and data from potential threats and unauthorized access.
- 5. / Means the program to increase the knowledge and improve the attitude that members of an organization possess regarding the protection of the physical, and especially informational, assets of an organization.
- 7. / Responsible for managing and maintaining the security of computer systems, including user accounts, access controls, and system configurations.
- 10. Issues / Refers to the ethical, legal, and social considerations related to technology and cybersecurity, including privacy and compliance issues.
- 12. / Refer to the underlying software and hardware technologies that provide a foundation for building applications or services, like operating systems or cloud platforms.
Down
- 1. / The study, planning and design of how people and computers work together so that a person’s need are satisfied in the most effective way.
- 3. and Architecture / Addresses the security aspects of integrating different systems and designing secure system architectures.
- 4. / Refers to physical security measures, such as securing data centers, facilities, and infrastructure from physical threats.
- 6. / Centered on securing web applications, servers, and the communication between users and web services.
- 8. / Refers to the practice of integrating different software components or systems to work together cohesively and efficiently.
- 9. / Deals with the secure handling, storage, retrieval, and sharing of sensitive information and data within an organization.
- 11. / Refers to the foundational principles and concepts in computer programming, such as data structures, algorithms, and coding basics.