cyber-sense

12345678910111213141516171819202122232425
Across
  1. 6. A type of virus that locks files until a ransom is paid -
  2. 9. Software embedded in hardware -
  3. 12. type of security attack where data is intercepted during transmission -
  4. 14. A set of rules for data transmission -
  5. 15. The process of confirming a user’s identity before granting access -
  6. 16. ADDRESS A unique identifier assigned to each device on a network -
  7. 18. BREACH A security breach where data is stolen or leaked -
  8. 19. Security based on physical characteristics -
  9. 20. A step-by-step procedure for solving a problem -
  10. 21. REPORT An official report of an attack, breach, or security incident -
  11. 23. An encrypted connection that protects data sent over the internet -
  12. 24. A method of verifying identity using two factors -
Down
  1. 1. Software that tracks user activities without their knowledge -
  2. 2. A system of interconnected devices -
  3. 3. A security system that monitors and controls incoming and outgoing network traffic -
  4. 4. A program that replicates itself and spreads from one device to another -
  5. 5. The practice of disguising digital messages to protect them from unauthorized access -
  6. 7. A software bug that allows unauthorized access to a system -
  7. 8. A secret code used to protect accounts -
  8. 10. A method for securing passwords -
  9. 11. An attempt to guess a password by trying many different combinations -
  10. 13. Malicious software designed to damage or disrupt systems -
  11. 17. An attack where someone tricks you into giving personal information -
  12. 22. A scam where an attacker pretends to be a trusted source -
  13. 25. harmful program disguised as a legitimate file or software -