cyberscurity puzzule
Across
- 1. - Copy of data stored separately for recovery in case of loss.
- 3. - Process of converting data into a format that cannot be easily accessed by unauthorized users.
- 5. - Device or node connected to a network.
- 7. - Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- 8. - Malware that encrypts files and demands payment for their release.
- 13. - Vulnerability that is exploited before the vendor releases a patch.
- 16. - Unforeseen event that disrupts normal operations and compromises security.
- 18. - Fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- 19. - Network security system that monitors and controls incoming and outgoing network traffic.
- 21. - Set of rules and procedures governing how an organization manages and protects its data.
Down
- 2. - Testing method used to identify security weaknesses in a system
- 4. - Weakness in a system that can be exploited by threats to compromise security.
- 6. - Authentication method requiring two forms of identification for access.
- 9. - Software designed to detect and remove malicious software.
- 10. - Segmentation - Dividing a network into smaller segments to reduce attack surface.
- 11. - of Service (DoS) - Attack that disrupts services by overwhelming a system with traffic.
- 12. - Update to a computer program or its supporting data designed to fix or improve it.
- 14. - Process of verifying the identity of a user or system.
- 15. - Engineering tactic that manipulates individuals into divulging confidential information.
- 17. - Breach - Unauthorized access to sensitive or confidential information.
- 20. - Unauthorized access to a computer system or network.