Cybersecurity Crossword

123456789101112131415
Across
  1. 5. Software that monitors user activities and reports them to a third party
  2. 7. A test that outlines the steps to restoring data after a severe setback
  3. 8. A successful hack to gain control of a network and leak its data
  4. 10. A scan hackers use to detect areas of weakness via sending messages to identify activity
  5. 12. a type of computer network device that interconnects with other networks using the same protocol
  6. 13. An intermediary server between a user and the internet that protects the enterprise from outside intrusion
  7. 15. The practice of adhering to standards and regulatory requirements
Down
  1. 1. An AI-manipulated video in someone’s likeness to spread misleading information
  2. 2. Malicious software often in the form of spam emails
  3. 3. A misleading computer program with a name deriving from Greek history
  4. 4. A scam perpetrated by a hacker posing as a legitimate
  5. 6. A small update to fix bugs in existing programs
  6. 9. A special code to protect your digital information
  7. 11. An internal computer network closed to outsiders
  8. 14. A network that disguises users’ IP addresses with its own to deter hackers