Cyber Security

12345678
Across
  1. 5. A type of cyber attack that involves stealing sensitive information, such as credit card numbers or personal identification.
  2. 6. A threat that originates from outside an organization's network.
  3. 7. A type of cyber attack that involves tricking a user into revealing sensitive information, such as passwords or credit card numbers.
  4. 8. A barrier that controls incoming and outgoing network traffic based on predetermined security rules.
Down
  1. 1. Computer programs and related data that provide the instructions for telling a computer what to do and how to do it.
  2. 2. A type of cyber attack that involves using social engineering techniques to manipulate individuals into divulging sensitive information or performing actions that may compromise their own or an organization's security.
  3. 3. The process of protecting computers, networks, and data from unauthorized access or attacks.
  4. 4. Intending or likely to cause harm or mischief.