Cybersecurity Terms

1234567891011121314
Across
  1. 10. Flooding a service so it can’t respond normally.
  2. 11. A fix released to close a security hole.
  3. 12. Login info (like usernames, passwords, tokens).
  4. 13. A second step to confirm a login (code/app prompt).
  5. 14. Many infected devices controlled together by an attacker.
Down
  1. 1. A weakness in software/system that can be exploited.
  2. 2. Scrambling data so only the right key can read it.
  3. 3. Threat coming from someone within the organisation.
  4. 4. Installing the latest version to improve/secure software.
  5. 5. Malware that locks files until money is demanded.
  6. 6. Trick messages designed to steal info or make you click.
  7. 7. When data is accessed/stolen without permission.
  8. 8. A secret used to access an account.
  9. 9. Multiple methods to prove identity (similar to 2FA).