Cybersecurity terminology challenge
Across
- 3. authentication: Using additional authentication steps.
- 5. Data: Information that requires protection due to its importance.
- 7. devices: Securing sensitive information through encryption.
- 11. A system of interconnected computers and devices.
- 12. Fixing damaged equipment or systems.
- 13. backup: Regularly saving important files.
- 15. Malicious software, often used in phishing.
- 16. passwords: Mandating password usage for device access.
- 20. network: A network for wireless device connections.
Down
- 1. Malicious software that locks your data and demands payment.
- 2. Isolate infected computers from the network.
- 4. attempt: Suspicious requests for sensitive information.
- 6. Informing relevant parties about a situation.
- 8. software: Keeping applications and systems current.
- 9. The process of restoring normalcy after an incident.
- 10. Personnel Access: Unauthorized entry by individuals who should not have access.
- 14. encryption: A type of wireless security encryption.
- 17. Drives: Small removable storage devices.
- 18. A device managing internet connections.
- 19. Deceptive emails with links or attachments to steal data.