Practice Cybersecurity Terminology Puzzle
Across
- 4. Data hostage for ransom
- 7. Protection of networks from threats
- 8. Update that fixes vulnerabilities
- 13. Requires multiple identity proofs
- 14. Information about cyber threats
- 15. Malicious software that harms systems
- 18. Encoding sensitive information
- 19. Impersonation to obtain information
Down
- 1. Vulnerability with no available patch
- 2. Weakness in a system
- 3. Distributed denial-of-service attack
- 5. Verifying user identity
- 6. Converting data into codes
- 9. Longterm targeted cyberattack
- 10. Secure internet connection
- 11. Unauthorized access to systems
- 12. Blocks unwanted traffic
- 16. Software that detects malware
- 17. Software that secretly monitors
- 20. Continuous cybersecurity monitoring