Across
- 4. A technology that creates a secure, encrypted connection over a less secure network, such as the internet.
- 5. The process of identifying, analyzing, and evaluating potential risks to a system.
- 6. A method of authentication that require two or more methods to gain access.
- 7. Unsolicited or undesired electronic messages, typically email.
- 10. The practice and study of techniques for secure communication in the presence of adversaries.
- 12. The process of verifying the identity of a user or system.
- 14. A socially engineered cyberattack where an attacker attempts to trick individuals into revealing sensitive information, often through deceptive emails or websites.
- 17. Software designed to detect, prevent, and remove malicious software.
- 18. An incident where unauthorized access to data or systems occurs.
- 19. Short for malicious software.
- 20. A software update released to fix vulnerabilities and bugs.
Down
- 1. A cyber attack made from numerous compromised computer systems.
- 2. An attempt to disrupt, damage, or gain unauthorized access to various computer systems.
- 3. The process of converting data into code, especially to prevent unauthorized access.
- 8. Making full use of and/or derive benefit from a resource.
- 9. A weakness or flaw in a system that can be exploited by a threat.
- 11. A type of malware that maliciously encrypts files and demands money for release.
- 13. A potential danger that might exploit a vulnerability to breach security.
- 15. A type of malicious software that attaches itself to legitimate programs and spreads to other computers.
- 16. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
