Cybersecurity

12345678910
Across
  1. 6. A deliberate attempt by hackers or malicious entities to infiltrate systems, networks, or devices to steal, alter, or destroy data, disrupt operations, or cause damage.
  2. 8. A weakness in a system that could be exploited.
  3. 9. Breaches Confidential, sensitive, or protected information is accessed, disclosed, or stolen by unauthorized individuals.
Down
  1. 1. A piece of software or technique used to take advantage of a vulnerability.
  2. 2. A measure of the extent to which an entity is threatened by a potential circumstance or event.
  3. 3. Theft Someone illegally obtains and uses another person’s personal information to impersonate them for financial gain or fraud.
  4. 4. The part of malware that performs malicious actions once a system is compromised.
  5. 5. Previously unknown vulnerabilities that can be exploited before a patch is available.
  6. 7. A potential danger to a system or organization.
  7. 9. Measures taken to protect against attacks and mitigate risks.
  8. 10. An attempt to exploit a vulnerability to compromise a system.