025-1
Across
- 2. Process of restoring systems or data after an incident
- 6. Unauthorized access to sensitive information
- 9. Related to laws or regulations governing cybersecurity incidents
- 11. Systematic examination to uncover facts about an incident
- 13. Unauthorized transfer of data from a computer or network
- 14. Malicious software demanding payment for data release
- 15. Method used to secure data from unauthorized access
- 16. Scientific analysis used to investigate and solve crimes
- 19. Interruption to normal operations
Down
- 1. Rules and guidelines governing cybersecurity practices
- 3. Weakness in software or hardware that could be exploited
- 4. State of exposing assets to danger or risk
- 5. Process of discovering unauthorized access or activity
- 7. Event that causes disruption or harm
- 8. Identity concealed or not identified
- 10. Digital currency used in ransom demands
- 12. Measures taken to protect against unauthorized access
- 15. Taking advantage of vulnerabilities in software or hardware
- 17. A malicious assault on computer systems
- 18. Effect or influence of the cyberattack