Basic cybersecurity terms

12345678910
Across
  1. 2. An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
  2. 4. The process of converting information or data into a code, especially to prevent unauthorized access.
  3. 8. A security process that verifies the identity of a user or device attempting to access a system.
  4. 9. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
  5. 10. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. 1. A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  2. 3. An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
  3. 5. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. 6. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  5. 7. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.