SBLI Cyber Month Crossword Puzzle!

123456789101112131415161718192021222324
Across
  1. 1. A type of cyberattack that overwhelms a service with traffic from multiple sources. (acronym)
  2. 3. A service that creates a secure connection over the internet, often used for privacy. (acronym)
  3. 7. Device used to secure doors or containers, often requiring a key or combination. (1 word)
  4. 8. Software that detects and removes malicious software from a computer. (1 word)
  5. 12. Software designed to disrupt, damage, or gain unauthorized access to systems. (1 word)
  6. 13. Device used to watch and record activity in a specific area for safety purposes.(2 words)
  7. 16. The process of converting data into a fixed-size string of characters, typically for data integrity.(1 word)
  8. 17. A type of malware that locks users out of their data, demanding payment for access. (1 word)
  9. 18. Unique pattern of ridges and valleys on the skin of a finger, used for identification.
  10. 21. The process of converting information into a code to prevent unauthorized access. (1 word)
  11. 24. A list of trusted entities or applications that are granted access. (1 word)
Down
  1. 1. An attack aimed at making a service unavailable to its intended users. Also called a DoS attack (3 words)
  2. 2. A method of bypassing normal authentication, often used for malicious purposes. (1 word)
  3. 4. Ethan and Brian make up this team (2 words)
  4. 5. A cryptographic method to verify the authenticity and integrity of a message or document. (2 words)
  5. 6. Software that secretly monitors user activity and collects personal information. (1 word)
  6. 9. Team that handles SBLI's tech (acronym)
  7. 10. Manipulating individuals into divulging confidential information. (2 words)
  8. 11. A software update designed to fix vulnerabilities or bugs. (1 word)
  9. 14. Malware disguised as legitimate software to trick users into installing it. (1 word)
  10. 15. Strategies and tools designed to prevent data breaches and ensure sensitive information is not lost. (3 words)
  11. 19. A weakness in a system that can be exploited by threats. (1 word)
  12. 20. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity. (1 word)
  13. 22. A network security system that monitors and controls incoming and outgoing traffic. (1 word)
  14. 23. An incident where unauthorized access to data occurs. (1 word)