cybersecurity story
Across
- 4. - software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access
- 6. - The protection of the cyber realms
- 7. - a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware
- 8. - the technique by which any kind of information can be converted into a secret form that conceals the actual meaning
- 9. - someone who tries to access data they aren't authorized to view
- 10. - monitoring network security system
Down
- 1. - What happens when the firewall is broken
- 2. - A security incident where confidential information is stolen
- 3. - the story this puzzle is about
- 5. - a mechanism for creating a secure connection