CyberSecurity Trivia
Across
- 4. Unsolicited emails
- 5. Protection of physical assets
- 10. Authentication method using two steps
- 11. Copy of data for recovery
- 12. Protection of personal information
- 13. Harmful software
- 20. Monitoring for unauthorized access
- 24. Potential danger
- 26. Software to detect and remove viruses
- 27. Epiq's CISO
- 28. Network security barrier
- 29. Ethical hacking to find vulnerabilities
- 30. Evaluation of potential threats
Down
- 1. Data protection through coding
- 2. Encrypted communication protocol
- 3. Adherence to regulations
- 6. Examination of security measures
- 7. Network security barrier (again)
- 8. Offensive action against computer systems
- 9. Process of updating software vulnerabilities
- 14. Permission to access resources
- 15. Weakness in a system's security
- 16. Software update to fix vulnerabilities
- 17. Psychological manipulation for information
- 18. Verification of who someone is
- 19. Science of secure communication
- 21. Protection against threats
- 22. Breach of security
- 23. Overwhelming a system to deny access
- 25. Deceptive email or website to steal information