cybersecurity dylan
Across
- 2. Encrypts files and demands payment
- 8. User education against threats
- 11. Set of security rules
- 13. Creates a digital fingerprint of data
- 16. Detects and removes malware
- 17. Steps to handle a cyberattack
- 18. Replaces sensitive data with tokens
- 20. Security barrier between internal and external networks
- 21. Code that takes advantage of a vulnerability
- 22. Attack that makes a service unavailable
Down
- 1. Unauthorized data exposure
- 3. Social engineering attack via fake messages
- 4. Multi-Factor Authentication
- 5. Compromise of system or information
- 6. Install latest security patches
- 7. Data copy for recovery
- 9. The process of transforming data into ciphertext
- 10. Malicious software such as viruses or trojans
- 12. Everyday security best practices
- 14. Restricts user permissions
- 15. Secret key to access accounts
- 19. Verifies the identity of a user or system