Cybersecurity Awareness Month
Across
- 2. A type of malware that demands payment in exchange for restoring access to data
- 4. A type of malicious software that replicates itself by attaching to other programs or files, potentially causing harm to computer systems, networks, or data.
- 7. Creating a copy of data to prevent its loss in case of a disaster or data breach
- 8. A type of software that is designed to damage or exploit a computer system
- 11. The process of converting data into a secure format to prevent unauthorized access and ensure confidentiality.
- 12. The potential for loss or damage when a threat exploits a vulnerability, often assessed in terms of likelihood and impact on organizational assets.
- 13. The process of verifying the identity of a user, device, or system
Down
- 1. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
- 3. Type of malware that allows an attacker to remotely control a system or network
- 4. A network that encrypts internet connections and helps secure remote access to a network
- 5. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments
- 6. Unsolicited, unwanted, and often malicious messages sent in bulk.
- 9. Attack where an attacker gains unauthorized access to a system or network
- 10. The act of revising software or systems to fix vulnerabilities and enhance security against emerging threats.