Cybersecurity Terms

123456789101112131415
Across
  1. 4. A software update to fix security flaws. (5 letters)
  2. 7. Manipulating people to divulge confidential information. (15 letters)
  3. 8. Granting permissions to access resources. (13 letters)
  4. 9. System that monitors networks for suspicious activity. (3 letters)
  5. 10. Malware that encrypts files and demands payment. (11 letters)
  6. 11. A network security system that blocks unauthorized access. (8 letters)
  7. 12. Weakness in a system that can be exploited. (12 letters)
  8. 13. Securely connects a user to a network over the internet. (3 letters)
  9. 14. Exploit targeting a previously unknown vulnerability. (8 letters)
  10. 15. Attack that overwhelms a system with traffic to crash it. (4 letters)
Down
  1. 1. Security method requiring two types of verification. (10 letters, hyphenated)
  2. 2. Scrambling data to make it unreadable without a key. (10 letters)
  3. 3. Malicious software designed to harm or exploit systems. (7 letters)
  4. 5. Process of verifying a user’s identity. (14 letters)
  5. 6. Deceptive emails or messages to steal sensitive data. (8 letters)