DECRYPT THE GRID

1234567891011121314151617181920
Across
  1. 5. Software intentionally designed to harm, disrupt, or gain unauthorized access to a system.
  2. 7. Safety copy of your important data- your best friend during a crash.
  3. 9. A storage location for code or data, often used in DevOps.
  4. 11. Temporary storage that helps apps or browsers load faster.
  5. 14. Malicious software that locks or encrypts data until payment is made.
  6. 16. A person who manages system or network configurations.
  7. 17. A security barrier that filters traffic between networks.
  8. 18. A major platform where oversharing can cause security risks.
  9. 19. A scam where fake emails or messages trick users into giving away personal information.
  10. 20. Finding and fixing errors in code.
Down
  1. 1. Username and password combination used to access accounts.
  2. 2. A piece of code that takes advantage of a software vulnerability.
  3. 3. Storing and accessing data over the internet instead of your hard drive.
  4. 4. The process of converting data into code to prevent unauthorized access.
  5. 6. The process of verifying the identity of a user or device.
  6. 8. Installing the latest version of software to fix bugs or vulnerabilities.
  7. 10. A group of connected computers that share resources and data.
  8. 12. A person who gains unauthorized access to systems sometimes ethical, sometimes not.
  9. 13. Systematic review of systems and logs to check for compliance.
  10. 15. Risk posed by employees or trusted individuals misusing access.