VCRA July 2024 Puzzle
Across
- 1. Data recovery solution
- 3. Target-specific phishing
- 10. Unauthorized data exposure
- 11. Secure code conversion process
- 13. Malicious computer network
- 14. Security for web connections
- 15. Relating to computer security
- 17. Monitors and controls network traffic
- 18. Traffic disrupting attack
Down
- 2. Following legal standards
- 4. Fixes software vulnerabilities
- 5. Unauthorized computer access
- 6. Review of cybersecurity practices
- 7. Potential negative impact
- 8. Data-locking extortion malware
- 9. Software meant to damage systems
- 12. Sensitive info stealing method
- 16. Potential for IT loss