Cyber Security Week
Across
- 2. What type of malicious software is designed to block access to a computer system until a sum of money is paid?
- 3. What is the exploitation of multiple security vulnerabilities in a system to gain unauthorized access?
- 4. What is the process of converting information into a code to prevent unauthorized access?
- 5. What is a secret combination of letters, numbers, and symbols used to access a system or account?
- 6. What is the practice of protecting systems, networks, and programs from digital attacks?
- 7. What is the practice of regularly updating software and systems to protect against known vulnerabilities?
- 8. What type of software is designed to block unauthorized access while permitting authorized communication?
Down
- 1. What is the act of pretending to be someone else to deceive or gain access to information?
- 5. What is a deceptive email or website designed to trick individuals into revealing personal information?
- 7. What is a set of security rules and policies that govern the use of an organization's information technology resources?