Cybersecurity Crossword Puzzle
Across
- 2. Engineering, Is a technique that a hacker uses to steal data by a person for different purposes by psychological manipulation combined with social scenes.
- 3. access, When someone gains access to a server, website, or other sensitive data using someone else's account details.
- 7. It is a software or hardware which is used to filter network traffic based on rules.
- 9. It is a weakness, a design problem or implementation error in a system that can lead to an unexpected and undesirable event regarding the security system.
- 10. Is a software that operates on different OS which is used to prevent malicious software.
- 11. security, the protection of computer systems and information from harm, theft, and unauthorized use.
Down
- 1. Is a person who tries and exploits a computer system for a reason which can be money, a social cause, fun etc.
- 4. Is an action or event that might compromise the security.
- 5. It is a malicious software that installs on your computer without your consent for a bad purpose.
- 6. security, refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access.
- 8. Is an assault on the system security that is delivered by a person or a machine to a system.