Cybersecurity Awareness R5

12345678910111213141516
Across
  1. 3. Extra Layer of security that requires users to provide multiple forms of verification before they can access a system or account
  2. 6. method or code used to take advantage of that weakness
  3. 7. A method transforming the original data into an unreadable format.
  4. 8. Unauthorized access to confidential or sensitive data.
  5. 11. System that prevents unauthorized access to or from a private network.
  6. 12. Converting data into a secure format to prevent unauthorized access.
  7. 16. A network of compromised computers controlled by attackers to launch cyber attacks.
Down
  1. 1. Weakness in a system that can be exploited by threats.
  2. 2. A malware that encrypts data and demands payment for decryption.
  3. 4. A division under DICT Cybersecurity Bureau responsible for receiving, reviewing and responding to computer security incident reports and activities
  4. 5. Software update designed to fix security vulnerabilities
  5. 9. A phishing attack that uses text messages to trick individual into divulging personal information.
  6. 10. A type of cyberattack where malicious actors attempt to trick individuals into revealing sensitive information
  7. 13. Attached agency of DICT created upon the approval of Cybercrime Prevention Act of 2012; this agency is a part of the inter-Agency Response Center where you can report cyber incidents through hotline 1326.
  8. 14. One of the frontline services of the DICT that ensures secure data Transactions.
  9. 15. Attached agency of DICT Mandated to administer and implement the Data Privacy Act of 2012; the country's privacy watchdog.