Cyber Security
Across
- 3. A weakness in software, hardware, or processes that can be exploited by an attacker to gain unauthorized access or cause harm.
- 6. A previously unknown vulnerability for which no patch or fix exists yet; attackers can exploit it before vendors can respond.
- 7. A social‑engineering attack that uses deceptive messages (often email or text) to trick people into revealing sensitive information or clicking malicious links.
- 8. Software designed to harm, exploit, or otherwise compromise computers or networks; includes viruses, worms, trojans, ransomware, and spyware.
- 10. that manipulate people into breaking normal security procedures or revealing confidential information (includes phishing, pretexting, baiting).
- 12. A type of malware that encrypts a user’s files or system and demands payment (a ransom) for the decryption key.
- 13. system A tool or service that monitors network or system activity for malicious behavior or policy violations and alerts administrators when suspicious events occur.
- 14. A security system (software or hardware) that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- 1. The process of verifying the identity of a person, device, or system before granting access
- 2. Any device (computer, phone, tablet, IoT device) that connects to a network and can be a target or entry point for attacks.
- 4. Security that requires two or more independent credentials (something you know, have, or are) to verify identity (e.g., password + text code).
- 5. The process of transforming data so that only someone with the correct key can read it; used to protect information in transit and at rest.
- 9. An update to software or firmware that fixes bugs or security vulnerabilities; applying patches reduces risk of exploits
- 11. A method, tool, or piece of code that takes advantage of a vulnerability to carry out an attack.