CS Month Week 2

12345678
Across
  1. 2. _______ Control: The practice of restricting access to resources based on user roles and permissions to prevent unauthorized access.
  2. 4. Cybersecurity _______:A structured approach that defines guidelines and best practices for securing information systems.
  3. 6. _______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident.
  4. 7. _______ of Service: An attack that overwhelms a system, network, or website with excessive traffic, rendering it inaccessible.
  5. 8. The process of verifying the identity of a user, system, or device to grant access to resources.
Down
  1. 1. ______ Breach: Unauthorized access, acquisition, or disclosure of sensitive data, often involving large amounts of personal or confidential information.
  2. 3. _______Testing: Ethical hacking conducted to identify vulnerabilities and assess the security of a system or network
  3. 5. Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.