CROSSWORD

123456789101112131415
Across
  1. 8. A service that creates a secure connection over the internet.
  2. 9. The process of addressing and managing the aftermath of a security breach or cyberattack.
  3. 10. A cryptographic key that can be shared openly and is used for encryption.
  4. 11. The process of replacing sensitive data with unique identification symbols.
  5. 13. An incident where unauthorized access to data occurs.
  6. 14. A network security device that monitors and filters incoming and outgoing traffic.
  7. 15. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
Down
  1. 1. Best practices and steps to maintain cybersecurity and protect personal information.
  2. 2. The process of converting encrypted data back into its original form.
  3. 3. A targeted attempt to steal sensitive information by masquerading as a trusted entity.
  4. 4. The study of methods to break encryption or analyze cryptographic systems.
  5. 5. A weakness in a system that can be exploited by attackers.
  6. 6. Software designed to detect and remove malware from computers.
  7. 7. A method for restricting access to resources to authorized users only.
  8. 12. The practice of hiding information within another medium, such as images or text.