cy-rite crossword
Across
- 1. Response The process of identifying, managing, and recovering from a cybersecurity breach.
- 4. Software that secretly collects user information without consent.
- 8. Intelligence Information about potential or current attacks that helps organizations prepare for or respond to cyber threats.
- 10. Malware disguised as legitimate software, used to trick users into installing it.
Down
- 2. The practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
- 3. The process of converting encrypted data back into its original readable form.
- 5. A method of guessing passwords or encryption keys by trying all possible combinations.
- 6. A type of malware that attaches itself to a legitimate program or file and spreads to other systems.
- 7. Breach An event where sensitive or confidential data is accessed, disclosed, or stolen without authorization.
- 9. A self-replicating program that spreads through networks without user action.