DECRYPT THE GRID
Across
- 5. Software intentionally designed to harm, disrupt, or gain unauthorized access to a system.
- 7. Safety copy of your important data- your best friend during a crash.
- 9. A storage location for code or data, often used in DevOps.
- 11. Temporary storage that helps apps or browsers load faster.
- 14. Malicious software that locks or encrypts data until payment is made.
- 16. A person who manages system or network configurations.
- 17. A security barrier that filters traffic between networks.
- 18. A major platform where oversharing can cause security risks.
- 19. A scam where fake emails or messages trick users into giving away personal information.
- 20. Finding and fixing errors in code.
Down
- 1. Username and password combination used to access accounts.
- 2. A piece of code that takes advantage of a software vulnerability.
- 3. Storing and accessing data over the internet instead of your hard drive.
- 4. The process of converting data into code to prevent unauthorized access.
- 6. The process of verifying the identity of a user or device.
- 8. Installing the latest version of software to fix bugs or vulnerabilities.
- 10. A group of connected computers that share resources and data.
- 12. A person who gains unauthorized access to systems sometimes ethical, sometimes not.
- 13. Systematic review of systems and logs to check for compliance.
- 15. Risk posed by employees or trusted individuals misusing access.