CyberSecurity
Across
- 2. Software designed to disrupt, damage, or gain unauthorized access to a computer system
- 3. A service that encrypts users' data and masks their IP addresses
- 5. Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- 7. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- 11. The process of converting information into ciphertext
- 12. Where the recruitment, retention and advancement of women in cybersecurity happens.
Down
- 1. The process of decoding cipher text to plain text
- 4. The practice of sending fraudulent communications that appear to come from a legitimate source
- 6. Contains items that are temporarily blocked until an additional step is performed
- 8. A term used to describe a person who tries to gain unauthorized access to a network or computer system
- 9. A vulnerability exploited before developers release a fix
- 10. Malware that self-replicates and spreads without human interaction