Cybersecurity

12345678910
Across
  1. 4. Unsolicited or unwanted email, often containing malicious links or attachments.
  2. 5. Unauthorized access or exposure of sensitive information.
  3. 6. A security mechanism that uses unique physical or behavioral characteristics to authenticate users.
  4. 9. Manipulating individuals into divulging confidential information or performing actions that compromise security.
  5. 10. Measures taken to protect the integrity and confidentiality of data transmitted over a network.
Down
  1. 1. Malware that encrypts files or systems and demands payment for their release.
  2. 2. A form of MFA that requires users to provide two different authentication factors.
  3. 3. Knowledge and understanding of cybersecurity risks, threats, and best practices.
  4. 7. The process of responding to and mitigating the effects of a cybersecurity incident.
  5. 8. Software designed to detect, prevent, and remove malicious software from computer systems.