Cybersecurity

12345678910
Across
  1. 3. Weaknesses or flaws in software, hardware, or network infrastructure that can be exploited by attackers to compromise the security of a system.
  2. 8. The process of converting data into a form that is unreadable without the correct decryption key, thereby protecting it from unauthorized access.
  3. 10. The process of verifying the identity of a user or device attempting to access a system, often through passwords, biometric scans, or two-factor authentication methods.
Down
  1. 1. Deliberate actions taken by hackers or malicious entities to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
  2. 2. A type of cyber attack in which attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or financial data.
  3. 4. Unauthorized access or attempted access to a computer system or network by an individual or automated process.
  4. 5. Authentication techniques that rely on unique biological characteristics, such as fingerprints, iris scans, or facial recognition, to verify the identity of individuals accessing a system or device.
  5. 6. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. 7. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data, often spread through email attachments, infected websites, or removable media.
  7. 9. A software update designed to fix security vulnerabilities or address other issues within a program or operating system.