Cybersecurity Crossword Puzzle
Across
- 1. Prevents unauthorized access.
- 5. Unauthorized alteration of data.
- 6. (Common Vulnerabilities and Exposures) Software vulnerability database.
- 7. Flaws Software vulnerabilities.
- 9. Breach Stealing sensitive data.
- 11. Misleading email attacks.
- 12. Malware with a harmful payload.
- 14. Unauthorized access to data.
- 16. Common entry point for attacks.
- 18. Malware that hides within legitimate software.
- 20. Engineering Attacks exploiting human behavior.
Down
- 2. Encrypting communication data.
- 3. Control Access rights limitation.
- 4. Insecure code exploit.
- 8. Scrambling data for security.
- 10. Protects from viruses.
- 13. Removing sensitive data.
- 15. Malicious self-replicating code.
- 17. Protects data from unauthorized changes.
- 19. Malware that spreads via networks.