Cyber-1

12345678910111213
Across
  1. 2. A network security device that monitors and filters incoming and outgoing network traffic to block or allow data based on a set of security rules.
  2. 3. breach The unauthorized access, disclosure, or exposure of sensitive or confidential data to individuals or entities not authorized to possess it.
  3. 5. A deliberate and malicious attempt to breach the security of a computer system, network, or device.
  4. 6. The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can read the information.
  5. 9. A weakness or flaw in a system's security that can be exploited by attackers to compromise its integrity, confidentiality, or availability.
  6. 11. A secret combination of characters used to authenticate a user and grant access to a system, device, or application.
  7. 12. The process of verifying the identity of a user, device, or system before granting access to resources.
  8. 13. A collection of interconnected devices and systems that allow data and information to be shared among users.
Down
  1. 1. Criminal activities carried out using digital technologies, including hacking, fraud, and identity theft.
  2. 4. Software designed to detect, prevent, and remove malicious software (malware) from a computer or network.
  3. 5. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  4. 7. Unauthorized access or entry into a computer system, network, or environment with malicious intent.
  5. 8. Software designed to damage, disrupt, or gain unauthorized access to computer systems, including viruses, worms, and spyware.
  6. 10. A type of cyberattack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information like login credentials.
  7. 11. A software update or fix released to address security vulnerabilities or improve the performance of an application or operating system.