VCRA July 2024 Puzzle

123456789101112131415161718
Across
  1. 1. Data recovery solution
  2. 3. Target-specific phishing
  3. 10. Unauthorized data exposure
  4. 11. Secure code conversion process
  5. 13. Malicious computer network
  6. 14. Security for web connections
  7. 15. Relating to computer security
  8. 17. Monitors and controls network traffic
  9. 18. Traffic disrupting attack
Down
  1. 2. Following legal standards
  2. 4. Fixes software vulnerabilities
  3. 5. Unauthorized computer access
  4. 6. Review of cybersecurity practices
  5. 7. Potential negative impact
  6. 8. Data-locking extortion malware
  7. 9. Software meant to damage systems
  8. 12. Sensitive info stealing method
  9. 16. Potential for IT loss