2024 Cybersecurity Awareness Month

123456789101112131415161718192021
Across
  1. 2. A digital document used to verify the identity of a user or device online
  2. 6. Software used to detect, prevent, and remove malicious software
  3. 9. A security risk that originates from within the organization, often involving employees
  4. 12. A tool that records keystrokes on a keyboard, often used to steal sensitive information
  5. 13. The process of verifying a user or device
  6. 14. A person who uses technical skills to exploit systems or networks
  7. 16. The unauthorized access and retrieval of sensitive information from a system
  8. 18. A type of malware that locks users out of their systems until a ransom is paid
  9. 20. A hidden way of bypassing security controls in a system
  10. 21. A string of characters used to authenticate access to a system or account
Down
  1. 1. A software update designed to fix vulnerabilities or bugs
  2. 2. An attempt to damage, disrupt, or gain unauthorized access to a computer or network
  3. 3. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  4. 4. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
  5. 5. A network security system that monitors and controls incoming and outgoing traffic
  6. 7. A vulnerability in software that is taken advantage of by hackers to carry out attacks
  7. 8. A virtual private network that allows secure remote access to a network over the internet
  8. 10. The use of deception to manipulate individuals into divulging confidential information
  9. 11. The process used by an organization to handle and recover from a cyberattack
  10. 15. An additional security layer that requires a second form of verification beyond a password
  11. 17. The process of converting information or data into a code to prevent unauthorized access
  12. 19. Software that gathers information from a user's device without their knowledge