CyberSecurity

123456789101112
Across
  1. 2. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  2. 3. A service that encrypts users' data and masks their IP addresses
  3. 5. Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
  4. 7. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  5. 11. The process of converting information into ciphertext
  6. 12. Where the recruitment, retention and advancement of women in cybersecurity happens.
Down
  1. 1. The process of decoding cipher text to plain text
  2. 4. The practice of sending fraudulent communications that appear to come from a legitimate source
  3. 6. Contains items that are temporarily blocked until an additional step is performed
  4. 8. A term used to describe a person who tries to gain unauthorized access to a network or computer system
  5. 9. A vulnerability exploited before developers release a fix
  6. 10. Malware that self-replicates and spreads without human interaction