Cyber

12345678910
Across
  1. 2. Engineering The psychological manipulation of individuals to gain access to confidential information.
  2. 3. A software update designed to fix security vulnerabilities or improve functionality in a program or operating system.
  3. 5. Authentication (2FA): A security process that requires two forms of identification before granting access, typically a password and a verification code sent to a device.
  4. 7. (Virtual Private Network): A secure and encrypted connection between two points across a public network, often used to protect private web traffic from snooping.
  5. 9. The process of converting information into a code to prevent unauthorized access.
  6. 10. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. 1. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data.
  2. 4. Incident An event that compromises the security, confidentiality, integrity, or availability of information assets.
  3. 6. A device such as a computer, smartphone, or tablet that communicates with a network.
  4. 8. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.