Cyber-1
Across
- 2. A network security device that monitors and filters incoming and outgoing network traffic to block or allow data based on a set of security rules.
- 3. breach The unauthorized access, disclosure, or exposure of sensitive or confidential data to individuals or entities not authorized to possess it.
- 5. A deliberate and malicious attempt to breach the security of a computer system, network, or device.
- 6. The process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can read the information.
- 9. A weakness or flaw in a system's security that can be exploited by attackers to compromise its integrity, confidentiality, or availability.
- 11. A secret combination of characters used to authenticate a user and grant access to a system, device, or application.
- 12. The process of verifying the identity of a user, device, or system before granting access to resources.
- 13. A collection of interconnected devices and systems that allow data and information to be shared among users.
Down
- 1. Criminal activities carried out using digital technologies, including hacking, fraud, and identity theft.
- 4. Software designed to detect, prevent, and remove malicious software (malware) from a computer or network.
- 5. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- 7. Unauthorized access or entry into a computer system, network, or environment with malicious intent.
- 8. Software designed to damage, disrupt, or gain unauthorized access to computer systems, including viruses, worms, and spyware.
- 10. A type of cyberattack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information like login credentials.
- 11. A software update or fix released to address security vulnerabilities or improve the performance of an application or operating system.