Across
- 1. A software update intended to fix vulnerabilities or improve security within a computer program.
- 3. The protection of endpoints (devices such as computers, smartphones, and tablets) from various cyber threats.
- 5. The use of unique biological traits, such as fingerprints or facial recognition, to verify a user's identity.
- 7. A technology service that creates a secure and encrypted internet connection.
- 8. A security system that monitors and controls incoming and outgoing network traffic.
- 14. The process of managing and mitigating the impact of a cybersecurity incident, including investigating and responding to security breaches.
- 16. An attack that takes advantage of a security vulnerability on the same day it becomes publicly known.
- 17. A security process in which a user provides multiple identification factors to verify their identity.
- 18. A piece of software designed to update or fix problems with a computer program.
- 19. Unauthorized interception of network traffic to capture and analyze data, often used for malicious purposes.
- 20. A fraudulent attempt to obtain sensitive information, by disguising as a trustworthy entity.
Down
- 2. The practice and study of techniques for securing communication and data through the use of codes and ciphers.
- 4. Ethical hackers who use their skills to identify and fix security vulnerabilities rather than exploiting them for malicious purposes.
- 6. A security mechanism that monitors network activities for signs of malicious behavior.
- 9. A simulated cyberattack on a computer system or network to assess its vulnerabilities and weaknesses.
- 10. Malicious software designed to harm or exploit computer systems.
- 11. A network of compromised computers (bots) controlled by a single entity, often used for malicious activities such as spam or DDoS attacks.
- 12. The use of psychological manipulation to trick individuals into divulging confidential information.
- 13. An attempt to make a computer or network resource unavailable to its intended users by overwhelming it with a flood of illegitimate requests.
- 15. The process of converting information into a code to prevent unauthorized access.