cy-rite crossword

12345678910
Across
  1. 1. Response The process of identifying, managing, and recovering from a cybersecurity breach.
  2. 4. Software that secretly collects user information without consent.
  3. 8. Intelligence Information about potential or current attacks that helps organizations prepare for or respond to cyber threats.
  4. 10. Malware disguised as legitimate software, used to trick users into installing it.
Down
  1. 2. The practice of protecting systems, networks, and data from digital attacks, unauthorized access, or damage.
  2. 3. The process of converting encrypted data back into its original readable form.
  3. 5. A method of guessing passwords or encryption keys by trying all possible combinations.
  4. 6. A type of malware that attaches itself to a legitimate program or file and spreads to other systems.
  5. 7. Breach An event where sensitive or confidential data is accessed, disclosed, or stolen without authorization.
  6. 9. A self-replicating program that spreads through networks without user action.