025-1

12345678910111213141516171819
Across
  1. 2. Process of restoring systems or data after an incident
  2. 6. Unauthorized access to sensitive information
  3. 9. Related to laws or regulations governing cybersecurity incidents
  4. 11. Systematic examination to uncover facts about an incident
  5. 13. Unauthorized transfer of data from a computer or network
  6. 14. Malicious software demanding payment for data release
  7. 15. Method used to secure data from unauthorized access
  8. 16. Scientific analysis used to investigate and solve crimes
  9. 19. Interruption to normal operations
Down
  1. 1. Rules and guidelines governing cybersecurity practices
  2. 3. Weakness in software or hardware that could be exploited
  3. 4. State of exposing assets to danger or risk
  4. 5. Process of discovering unauthorized access or activity
  5. 7. Event that causes disruption or harm
  6. 8. Identity concealed or not identified
  7. 10. Digital currency used in ransom demands
  8. 12. Measures taken to protect against unauthorized access
  9. 15. Taking advantage of vulnerabilities in software or hardware
  10. 17. A malicious assault on computer systems
  11. 18. Effect or influence of the cyberattack