Cybersecurity
Across
- 4. Unsolicited or unwanted email, often containing malicious links or attachments.
- 5. Unauthorized access or exposure of sensitive information.
- 6. A security mechanism that uses unique physical or behavioral characteristics to authenticate users.
- 9. Manipulating individuals into divulging confidential information or performing actions that compromise security.
- 10. Measures taken to protect the integrity and confidentiality of data transmitted over a network.
Down
- 1. Malware that encrypts files or systems and demands payment for their release.
- 2. A form of MFA that requires users to provide two different authentication factors.
- 3. Knowledge and understanding of cybersecurity risks, threats, and best practices.
- 7. The process of responding to and mitigating the effects of a cybersecurity incident.
- 8. Software designed to detect, prevent, and remove malicious software from computer systems.