CyberSecurity Trivia

123456789101112131415161718192021222324252627282930
Across
  1. 4. Unsolicited emails
  2. 5. Protection of physical assets
  3. 10. Authentication method using two steps
  4. 11. Copy of data for recovery
  5. 12. Protection of personal information
  6. 13. Harmful software
  7. 20. Monitoring for unauthorized access
  8. 24. Potential danger
  9. 26. Software to detect and remove viruses
  10. 27. Epiq's CISO
  11. 28. Network security barrier
  12. 29. Ethical hacking to find vulnerabilities
  13. 30. Evaluation of potential threats
Down
  1. 1. Data protection through coding
  2. 2. Encrypted communication protocol
  3. 3. Adherence to regulations
  4. 6. Examination of security measures
  5. 7. Network security barrier (again)
  6. 8. Offensive action against computer systems
  7. 9. Process of updating software vulnerabilities
  8. 14. Permission to access resources
  9. 15. Weakness in a system's security
  10. 16. Software update to fix vulnerabilities
  11. 17. Psychological manipulation for information
  12. 18. Verification of who someone is
  13. 19. Science of secure communication
  14. 21. Protection against threats
  15. 22. Breach of security
  16. 23. Overwhelming a system to deny access
  17. 25. Deceptive email or website to steal information