First Call Cybersecurity Challenge
Across
- 2. Deliberate actions taken by cybercriminals to compromise the integrity, confidentiality, or availability of data or systems.
- 5. Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems.
- 9. Software: Programs designed to detect, block, and remove malicious software (viruses, worms, etc.) from a computer.
- 10. A cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords or credit card numbers.
- 11. A documented set of rules and guidelines that govern an organization's cybersecurity practices and procedures.
Down
- 1. Weaknesses or flaws in a computer system or network that can be exploited by attackers to compromise security.
- 3. A software update that fixes security vulnerabilities and enhances the stability of an application or operating system.
- 4. Malware that encrypts a victim's data and demands a ransom for the decryption key.
- 6. Three letter acronym for a security mechanism that requires users to provide two or more forms of authentication before accessing a system, enhancing security beyond 2FA.
- 7. The process of converting data into a code to prevent unauthorized access or data theft.
- 8. A network security device or software that monitors and filters incoming and outgoing network traffic to prevent unauthorized access.