Cybersecurity

1234567891011121314151617181920212223
Across
  1. 7. A prolonged, targeted attack where intruders gain access to a network and remain undetected.
  2. 12. Requiring more than one method to verify a user's identity.
  3. 13. A network of hijacked computers used to launch attacks like DDoS.
  4. 16. A security system that monitors and controls incoming and outgoing network traffic.
  5. 17. Any device connected to a network, such as laptops, phones, or servers.
  6. 19. Software designed to disrupt, damage, or gain unauthorized access.
  7. 20. Disguising a communication from an unknown source as being from a known, trusted source.
  8. 21. Authorized simulated attacks on a system to evaluate its security.
  9. 22. The process of verifying the identity of a user or system.
  10. 23. The process of acquiring, testing, and installing code changes (patches) to fix vulnerabilities.
Down
  1. 1. The unauthorized release or access of sensitive information.
  2. 2. Using fraudulent emails or websites to trick users into revealing sensitive data.
  3. 3. Routine practices to maintain system health and security.
  4. 4. A method of guessing passwords or encryption keys through massive trial-and-error.
  5. 5. A secure, encrypted connection between a user and a private network.
  6. 6. Manipulating people into performing actions or divulging confidential information.
  7. 8. Overwhelming a system with traffic to make it unavailable.
  8. 9. Converting data into a coded form to prevent unauthorized access.
  9. 10. Tools and processes to ensure sensitive data is not lost, misused, or accessed by unauthorized users.
  10. 11. confidentiality, integrity, availability
  11. 14. A security framework based on the philosophy "never trust, always verify"
  12. 15. Malware that encrypts files and demands payment for the decryption key.
  13. 18. Evidence on a network or operating system that indicates a security breach.