Cybersecurity Awareness Month

12345678910111213
Across
  1. 2. A type of malware that demands payment in exchange for restoring access to data
  2. 4. A type of malicious software that replicates itself by attaching to other programs or files, potentially causing harm to computer systems, networks, or data.
  3. 7. Creating a copy of data to prevent its loss in case of a disaster or data breach
  4. 8. A type of software that is designed to damage or exploit a computer system
  5. 11. The process of converting data into a secure format to prevent unauthorized access and ensure confidentiality.
  6. 12. The potential for loss or damage when a threat exploits a vulnerability, often assessed in terms of likelihood and impact on organizational assets.
  7. 13. The process of verifying the identity of a user, device, or system
Down
  1. 1. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  2. 3. Type of malware that allows an attacker to remotely control a system or network
  3. 4. A network that encrypts internet connections and helps secure remote access to a network
  4. 5. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments
  5. 6. Unsolicited, unwanted, and often malicious messages sent in bulk.
  6. 9. Attack where an attacker gains unauthorized access to a system or network
  7. 10. The act of revising software or systems to fix vulnerabilities and enhance security against emerging threats.