Cyber
Across
- 2. Engineering The psychological manipulation of individuals to gain access to confidential information.
- 3. A software update designed to fix security vulnerabilities or improve functionality in a program or operating system.
- 5. Authentication (2FA): A security process that requires two forms of identification before granting access, typically a password and a verification code sent to a device.
- 7. (Virtual Private Network): A secure and encrypted connection between two points across a public network, often used to protect private web traffic from snooping.
- 9. The process of converting information into a code to prevent unauthorized access.
- 10. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- 1. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data.
- 4. Incident An event that compromises the security, confidentiality, integrity, or availability of information assets.
- 6. A device such as a computer, smartphone, or tablet that communicates with a network.
- 8. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.