CS Month Week 1

12345678
Across
  1. 3. A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
  2. 4. A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
  3. 7. A deliberate attempt to compromise computer systems, networks, or data using various techniques.
  4. 8. A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
Down
  1. 1. The process of converting data into a secure code to prevent unauthorized access during transmission or storage.
  2. 2. A software update released to fix vulnerabilities and improve security in applications or systems.
  3. 5. ______ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
  4. 6. Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data.