CAES Security Week

12345678910
Across
  1. 2. This network security system acts as a barrier, controlling and monitoring incoming and outgoing traffic.
  2. 4. Enhances security by requiring users to provide two different authentication factors, often something they know and something they have.
  3. 7. The process of converting information into a code to secure it from unauthorized access.
  4. 8. Weaknesses or flaws in a system’s security that could be exploited by attackers.
  5. 9. A broad term for malicious software, including viruses, worms, and ransomware, designed to harm or exploit computer systems.
  6. 10. Cyber attackers often use deceptive emails or messages in an attempt to trick individuals into revealing sensitive information through this method.
Down
  1. 1. Software updates designed to fix security vulnerabilities and improve overall system performance.
  2. 3. Unauthorized access or breach into a system, network, or device.
  3. 5. The process of verifying the identity of a user, device, or system, typically through passwords or biometrics.
  4. 6. The art of writing or solving codes; used in cybersecurity to secure communication through encryption.