Edgescan Cybersecurity Crossword

12345678910111213141516171819202122232425262728293031323334353637
Across
  1. 3. Attempt to breach security
  2. 6. Verifying user identity
  3. 7. Malware that encrypts files and demands payment
  4. 9. Deceptive emails trying to steal information
  5. 10. Relating to computers and networks
  6. 12. Potential danger to a system
  7. 14. Checking for vulnerabilities
  8. 15. Self-replicating malicious code
  9. 17. Person attempting unauthorized access
  10. 20. Software update to fix vulnerabilities
  11. 21. Taking advantage of a vulnerability
  12. 22. Security event that may indicate a breach
  13. 23. Review of security controls
  14. 25. Information stored on a system
  15. 28. Attack that disrupts service availability
  16. 31. Restoring data after a loss
  17. 32. Malware disguised as legitimate software
  18. 34. Connected computers and devices
  19. 36. Weakness that can be exploited
  20. 37. Unsolicited bulk email
Down
  1. 1. Copy of data for recovery
  2. 2. Simulated attack to find weaknesses
  3. 4. Ensuring systems are accessible
  4. 5. Ensuring data accuracy
  5. 8. Unauthorized access to data
  6. 11. Software that hides malware on a system
  7. 13. Scrambling data to make it unreadable
  8. 14. Programs that run on a computer
  9. 16. Software that secretly monitors user activity
  10. 18. Keeping information secret
  11. 19. Protecting systems and data
  12. 20. Secret word for access
  13. 24. Protecting personal information
  14. 26. Measures to prevent attacks
  15. 27. Network of infected computers
  16. 29. Network security system controlling traffic
  17. 30. Safeguard from harm
  18. 33. Malicious software designed to harm systems
  19. 35. Potential for loss or damage