Cyber Security Awareness Month

123456789101112
Across
  1. 1. An initial phase of a cyber attack where information about a target system, network, or organization is gathered.
  2. 4. A method of faking an identity to gain access.
  3. 7. The process of converting encrypted data back to its original form.
  4. 8. A code or technique used to take advantage of a vulnerability.
  5. 9. A security event where unauthorized individuals gain access to a secure computer system, network, or database.
  6. 10. The process of verifying the identity of a user, device, or system before granting access to resources.
  7. 11. A type of malware designed to erase its tracks after executing its malicious actions.
  8. 12. The framework of policies and procedures that ensure cybersecurity practices are in line with organizational goals.
Down
  1. 2. The name for a number used only once in a cryptographic communication to prevent replay attacks.
  2. 3. The practice of making data difficult to understand thereby protecting it from unauthorized access or analysis.
  3. 5. The act of pretending to be someone else for malicious purposes.
  4. 6. A form of spear phishing that targets high-profile individuals, like executives.