CYBER SECURITY

123456789101112131415
Across
  1. 2. Software update designed to fix security vulnerabilities.
  2. 8. Interconnected computers facilitating communication and data exchange.
  3. 10. Measures to protect computer systems from attacks.
  4. 12. Hint: Verifying the identity of a user through passwords or biometrics.
  5. 13. Secret code for user access.
  6. 14. Deceptive emails or websites aiming to steal data.
  7. 15. breach Unauthorized access leading to the exposure of sensitive information.
Down
  1. 1. Software designed to harm or exploit computer systems.
  2. 3. Software designed to detect and remove malicious programs.
  3. 4. Converts sensitive information into a secret code.
  4. 5. Unauthorized access or breach into a system.
  5. 6. Deliberate exploitation of computer systems for malicious purposes.
  6. 7. Acts as a digital barrier to unauthorized access.
  7. 9. Requires two forms of identification for access.
  8. 11. Hint: Weakness in a system that could be exploited by attackers.