CYBER AWARENESS

123456789101112131415161718192021222324
Across
  1. 1. A group of experts dedicated to responding to computer security incidents.
  2. 3. The practice of protecting computer systems and networks from digital attacks.
  3. 5. The process of converting data into an unreadable format to protect it from unauthorized access.
  4. 7. Acronym for the process of collecting and analyzing publicly available information to gain insights.
  5. 11. The unauthorized access to computer systems or networks.
  6. 15. A notification from your security systems that someone is trying to break in (or, perhaps, has already done so).
  7. 17. Any malicious act aimed at disrupting, damaging, or stealing information from computer systems or networks.
  8. 19. A security system that monitors and controls network traffic.
  9. 20. The process of converting readable data (plaintext) into unreadable code (ciphertext) to protect it from unauthorized access.
  10. 22. Web The part of the internet that is not indexed by search engines but is accessible through specific URLs.
  11. 23. Malicious software designed to harm computer systems or networks.
  12. 24. A network of compromised computers controlled by an attacker.
Down
  1. 2. Acronym for the process of gathering, analyzing, and interpreting data from social media platforms to gain insights.
  2. 4. Malware that encrypts a victim's data and demands a ransom for its decryption.
  3. 6. Deceiving individuals into revealing sensitive information through fraudulent emails or messages.
  4. 8. The likelihood of a threat exploiting a vulnerability and causing harm.
  5. 9. A weakness in a system or network that can be exploited by attackers.
  6. 10. A piece of software or code that takes advantage of a vulnerability to gain unauthorized access.
  7. 12. The first decentralized digital currency / cryptocurrency in which transactions can be performed without the need for a central bank.
  8. 13. Web A part of the internet that is not indexed by search engines and requires special software to access.
  9. 14. A group of information security experts who respond to malware attacks or other computer security incidents.
  10. 16. Acronym for a software solution designed to streamline and automate various aspects of digital forensic investigations.
  11. 18. Acronym for a centralized team that combines cybersecurity efforts to better detect, prevent, and respond to cyber threats.
  12. 21. Illegal activities committed using computer networks or devices.