Cyber Puzzle

12345678910111213
Across
  1. 2. An exact replica of a hard drive
  2. 3. A tweak to the OS code that will fix an issue in how it runs or compatibility with devices and applications.
  3. 7. Fixes a vulnerability in the OS code to stop exploits
  4. 9. A Fix for a bug that is affecting OS functionality
  5. 10. A security flaw, glitch, or weakness found in software code that could be exploited by an attacker.
  6. 11. A specific code or attack technique that uses a vulnerability to carry out an attack or gain unauthorized access.
  7. 13. A backup that includes the operating system and configuration settings
Down
  1. 1. To minimize the risk or lessen the force or intensity of something unpleasant.
  2. 2. Physical objects that are embedded with sensors, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or networks.
  3. 4. Third-party programs installed by users to provide additional functions.
  4. 5. Is a structured process through which we identify potential security threats and vulnerabilities
  5. 6. A Patch for a very specific issue ‐not released through automatic updates.
  6. 8. A database of known vulnerabilities in all types of digital products.
  7. 12. Having several copies