CS Month Week 1

12345678910
Across
  1. 3. ________ Detection System: A security tool that monitors network traffic to detect and alert on suspicious or unauthorized activities.
  2. 6. Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data
  3. 8. ________ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
  4. 9. A deliberate attempt to compromise computer systems, networks, or data using various techniques.
  5. 10. A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
Down
  1. 1. _______-Day Vulnerability: A software vulnerability that is exploited by attackers before a patch is available from the vendor.
  2. 2. A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
  3. 4. A software update released to fix vulnerabilities and improve security in applications or systems.
  4. 5. A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
  5. 7. The process of converting data into a secure code to prevent unauthorized access during transmission or storage.