Across
- 2. The process of connecting systems, software, or services so they can share data and function together.
- 4. The process of transferring digital data (like files, software, images, videos) from a remote source, such as a server on the internet or another computer, to your local device (like your computer, phone, or tablet).
- 5. An update released by developers to fix security flaws, improve performance, or add new features.
- 7. SINGLE SIGN-ON
- 8. A set of standardized rules and procedures that govern how data is securely transmitted over a network.
- 12. A system upgrade provided by the software vendor to improve performance, fix bugs, and address security vulnerabilities.
- 14. The unauthorized release or exposure of sensitive or confidential information, often due to security vulnerabilities, human error, or breaches of third-party services.
- 16. Any individual, organization, or system whose data or access has been encrypted or locked by ransomware attackers, with a demand for payment to restore access.
- 19. A manipulation technique that exploits human error to gain access to confidential systems or data
- 21. Wi-Fi Protected Access II.
- 22. The primary password is used to access a password manager or secure system.
Down
- 1. Issued by a trusted Certificate Authority (CA) and verifies that a website, device, or user is legitimate and secure.
- 3. A tool or software that creates random, complex passwords, typically combining letters, numbers, and special characters, to enhance security and reduce the risk of unauthorized access.
- 6. Individuals or groups who use hacking techniques to promote political, social, or environmental causes, often by disrupting services, exposing information, or protesting against governments, corporations, or social injustices.
- 9. A browser alert that appears when a website's digital certificate is expired, improperly configured, self-signed, or issued by an untrusted Certificate Authority (CA).
- 10. The process of isolating potentially malicious files or software in a secure area of your device or network.
- 11. Wi-Fi Protected Access.
- 13. Wi-Fi Protected Access III.
- 15. Wired equivalent privacy.
- 17. Any unauthorized hardware—such as a USB drive, wireless access point, or laptop—that is connected to a network or system without permission.
- 18. Also known as Business Email Compromise (BEC), a type of cybercrime where attackers impersonate an executive or other trusted figure within a company to deceive employees.
- 20. A structured approach to identifying, managing, and recovering from a cybersecurity threat or breach.
