CYBER FEST CROSSWORD

12345678910111213141516
Across
  1. 4. Software designed to detect, prevent, and remove malware and other harmful software.
  2. 8. Measures or controls taken to protect systems, networks, and data from unauthorized access or harm.
  3. 9. A secret string of characters used to verify the identity of a user.
  4. 10. An attempt by hackers to damage or disrupt a computer system or network.
  5. 12. Ensuring that an organization meets regulatory and legal requirements for security practices.
  6. 14. Software that secretly monitors and collects personal information from a computer.
  7. 15. A shortened term for a festival or event, often used for gatherings celebrating specific themes like technology or cybersecurity.
  8. 16. The process of verifying the identity of a user or device before granting access to a system.
Down
  1. 1. Related to computers, information technology, or virtual reality, often used in the context of online environments.
  2. 2. The process of converting data into a secret code to protect it from unauthorized access.
  3. 3. A weakness in software, hardware, or procedures that could be exploited to cause harm.
  4. 5. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  5. 6. The use of software or hardware to record keystrokes typed on a computer, often used to steal passwords or personal information.
  6. 7. Any software intentionally designed to cause damage to a computer, server, or network.
  7. 11. A person who uses computers to gain unauthorized access to data.
  8. 13. A fraudulent attempt to obtain sensitive information, such as passwords, by pretending to be a trustworthy entity.