Cyber security

1234567891011121314151617181920
Across
  1. 2. Software designed to harm or exploit any device or network it infects.
  2. 4. A type of malware that encrypts a victim's files and demands payment in exchange for the decryption key.
  3. 7. Software designed to detect and remove viruses and other types of malware.
  4. 9. detection system Software that monitors a network or system for signs of unauthorized access or activity.
  5. 10. attack An attack that attempts to make a website or network unavailable to users by overwhelming it with traffic or requests.
  6. 12. authentication A security measure that requires two forms of identification to access an account.
  7. 13. breach The unauthorized access, use, or disclosure of sensitive information.
  8. 14. engineering The use of psychological manipulation to trick people into divulging confidential information or performing actions that are not in their best interest.
  9. 16. force attack A method of guessing a password by trying every possible combination until the correct one is found.
  10. 17. security The practice of securing a network from unauthorized access or attacks.
  11. 18. An update to software that fixes a vulnerability or bug.
  12. 19. Criminal activity that involves the use of digital devices or networks.
  13. 20. testing The process of testing a system or network for vulnerabilities by attempting to exploit them.
Down
  1. 1. exploit An attack that exploits a previously unknown vulnerability in a software application or system.
  2. 3. The process of verifying the identity of a user or system.
  3. 5. A type of social engineering attack that involves sending fraudulent emails or messages to trick people into sharing sensitive information.
  4. 6. Method of converting plain text into a code that can only be read by authorized parties.
  5. 8. A weakness or flaw in a system that can be exploited by attackers.
  6. 11. Network security system that monitors and controls incoming and outgoing network traffic.
  7. 15. The practice of protecting computer systems and networks from digital attacks, theft, and damage.