2025 Cybersecurity Awareness Month
Across
- 2. Software that displays unwanted advertisements.
- 5. A vulnerability unknown to those who should mitigate it.
- 7. Network security system that monitors and controls incoming and outgoing traffic.
- 10. System that aggregates and analyzes security data.
- 11. Software update that fixes vulnerabilities.
- 12. Malware disguised as legitimate software.
- 13. Symmetric encryption standard used worldwide.
- 15. Unauthorized transmission of sensitive information.
- 17. Isolated environment for testing suspicious code.
- 18. Framework for managing digital identities.
- 19. Routine practices to maintain security health.
- 20. Simulated attack to evaluate system security.
- 22. Security broker between users and cloud services.
- 26. Security method requiring multiple forms of verification.
- 28. Software that secretly gathers user information.
- 29. Protocol for secure communication over networks.
- 30. Attack method that tries every possible password combination.
Down
- 1. Psychological manipulation to trick users into giving up confidential info.
- 3. General term for malicious software.
- 4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- 6. Malware that encrypts data and demands payment for its release.
- 8. Prolonged and targeted cyberattack.
- 9. Creates a secure connection over the internet.
- 14. Malware that hides its presence from detection.
- 16. Process of converting data into a coded format.
- 21. Controls access to privileged accounts.
- 23. Network of infected devices controlled remotely.
- 24. Malware that replicates itself to spread.
- 25. Hidden method of bypassing normal authentication.
- 27. Converts data into a fixed-size string.