cybersecurity

12345678910
Across
  1. 3. theft: The crime of obtaining personal information and using it to assume someone else's identity.
  2. 4. This is the overall practice of protecting systems, networks, and data from digital attacks.
  3. 5. A piece of software designed to fix a vulnerability or bug.
  4. 8. Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
  5. 9. A weakness in a computer system that can be exploited by attackers.
  6. 10. A type of malware that restricts access to a computer system or data until a ransom is paid.
Down
  1. 1. A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
  2. 2. The process of converting information into a secret code to prevent unauthorized access.
  3. 6. authentication (2FA): A security process that requires two forms of identification, such as a password and a code sent to your phone.
  4. 7. A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.