CS Month Week 2

12345678
Across
  1. 2. _______ of Service: An attack that overwhelms a system, network, or website with excessive traffic, rendering it inaccessible.
  2. 4. _________ Testing: Ethical hacking conducted to identify vulnerabilities and assess the security of a system or network.
  3. 8. The process of verifying the identity of a user, system, or device to grant access to resources.
Down
  1. 1. _______ Detection System: A security tool that monitors network traffic to detect and alert on suspicious or unauthorized activities.
  2. 3. _______-Day Vulnerability: A software vulnerability that is exploited by attackers before a patch is available from the vendor.
  3. 5. ______ Response: A planned approach to managing and mitigating the impact of a cybersecurity incident.
  4. 6. Malware that encrypts a victim’s data and demands payment (ransom) for its decryption.
  5. 7. ______ Breach: Unauthorized access, acquisition, or disclosure of sensitive data, often involving large amounts of personal or confidential information.