CyberSecurity

12345678910
Across
  1. 3. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  2. 4. Where the recruitment, retention and advancement of women in cybersecurity happens.
  3. 6. Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
  4. 7. A term used to describe a person who tries to gain unauthorized access to a network or computer system
  5. 8. A service that encrypts users' data and masks their IP addresses
  6. 9. Contains items that are temporarily blocked until an additional step is performed
  7. 10. The practice of sending fraudulent communications that appear to come from a legitimate source
Down
  1. 1. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
  2. 2. The process of converting information into ciphertext
  3. 5. The process of decoding cipher text to plain text