Cybersecurity terminology challenge
Across
- 2. A type of wireless security encryption.
- 3. A network for wireless device connections.
- 6. Regularly saving important files.
- 8. Keeping applications and systems current.
- 9. Securing sensitive information through encryption.
- 10. Malicious software that locks your data and demands payment.
- 11. Malicious software, often used in phishing.
- 12. Deceptive emails with links or attachments to steal data.
- 13. Fixing damaged equipment or systems.
- 16. Mandating password usage for device access.
- 17. A device managing internet connections.
- 19. Using additional authentication steps.
Down
- 1. Information that requires protection due to its importance.
- 4. Informing relevant parties about a situation.
- 5. Unauthorized entry by individuals who should not have access.
- 7. A system of interconnected computers and devices.
- 8. Small removable storage devices.
- 14. The process of restoring normalcy after an incident.
- 15. Suspicious requests for sensitive information.
- 18. Isolate infected computers from the network.