Cyber Security

123456789101112131415
Across
  1. 1. – An event or occurrence that disrupts normal operations, often involving security threats.
  2. 3. – The act of breaking into a system, network, or data storage illegally.
  3. 4. – Free from danger or threat; used to describe a well-protected system.
  4. 7. – A copy of data stored separately to restore the original in case of data loss.
  5. 9. – Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  6. 10. – Unauthorized access or entry into a computer system or network.
  7. 11. – A secret word or phrase used to gain access to a computer system or service.
  8. 13. – Software specifically designed to disrupt, damage, or gain unauthorized access to systems.
  9. 15. – The process of verifying the identity of a user or system.
Down
  1. 2. – The process of converting data into a code to prevent unauthorized access.
  2. 5. – Adherence to laws, regulations, and standards, especially in cybersecurity.
  3. 6. – A type of malicious software that replicates itself and spreads to other systems.
  4. 8. – A network security system that monitors and controls incoming and outgoing network traffic.
  5. 12. – Malicious software designed to gather information about a person or organization without their knowledge.
  6. 14. – Strong and reliable, often used to describe a system that can withstand attacks or failures.