Cybersecurity Practices

1234567891011121314151617181920
Across
  1. 4. | A security measure that requires more than one form of verification.
  2. 6. | An attempt to steal personal information by pretending to be a trustworthy entity.
  3. 8. | A software update that fixes security vulnerabilities.
  4. 9. | Software designed to detect and remove malware.
  5. 10. | A vulnerability that is exploited before it is publicly known or patched.
  6. 11. | A network of infected devices used in cyber attacks.
  7. 12. | A type of malware that records keystrokes to steal sensitive information.
  8. 13. Breach | The unauthorized release of confidential information.
  9. 14. | The process of converting data into a code to prevent unauthorized access.
  10. 16. Engineering | Manipulating people into giving up confidential information.
  11. 17. | A type of malware that demands payment to restore data.
  12. 19. | A security system that monitors and controls incoming and outgoing network traffic.
  13. 20. | Software that is harmful to a computer system.
Down
  1. 1. | An attack that overwhelms a system by sending an excessive amount of requests.
  2. 2. | A weakness in a system that can be exploited by a cyber attacker.
  3. 3. | An attempt to damage or disrupt a computer system or network.
  4. 5. | The process of verifying the identity of a user or device.
  5. 7. | A decoy system set up to attract cyber attackers and study their behavior.
  6. 15. | Malware disguised as legitimate software.
  7. 18. | Software that gathers user information without their knowledge.