Cyber Security

1234567891011121314
Across
  1. 3. A weakness in software, hardware, or processes that can be exploited by an attacker to gain unauthorized access or cause harm.
  2. 6. A previously unknown vulnerability for which no patch or fix exists yet; attackers can exploit it before vendors can respond.
  3. 7. A social‑engineering attack that uses deceptive messages (often email or text) to trick people into revealing sensitive information or clicking malicious links.
  4. 8. Software designed to harm, exploit, or otherwise compromise computers or networks; includes viruses, worms, trojans, ransomware, and spyware.
  5. 10. that manipulate people into breaking normal security procedures or revealing confidential information (includes phishing, pretexting, baiting).
  6. 12. A type of malware that encrypts a user’s files or system and demands payment (a ransom) for the decryption key.
  7. 13. system A tool or service that monitors network or system activity for malicious behavior or policy violations and alerts administrators when suspicious events occur.
  8. 14. A security system (software or hardware) that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. 1. The process of verifying the identity of a person, device, or system before granting access
  2. 2. Any device (computer, phone, tablet, IoT device) that connects to a network and can be a target or entry point for attacks.
  3. 4. Security that requires two or more independent credentials (something you know, have, or are) to verify identity (e.g., password + text code).
  4. 5. The process of transforming data so that only someone with the correct key can read it; used to protect information in transit and at rest.
  5. 9. An update to software or firmware that fixes bugs or security vulnerabilities; applying patches reduces risk of exploits
  6. 11. A method, tool, or piece of code that takes advantage of a vulnerability to carry out an attack.