Across
- 1. – An event or occurrence that disrupts normal operations, often involving security threats.
- 3. – The act of breaking into a system, network, or data storage illegally.
- 4. – Free from danger or threat; used to describe a well-protected system.
- 7. – A copy of data stored separately to restore the original in case of data loss.
- 9. – Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- 10. – Unauthorized access or entry into a computer system or network.
- 11. – A secret word or phrase used to gain access to a computer system or service.
- 13. – Software specifically designed to disrupt, damage, or gain unauthorized access to systems.
- 15. – The process of verifying the identity of a user or system.
Down
- 2. – The process of converting data into a code to prevent unauthorized access.
- 5. – Adherence to laws, regulations, and standards, especially in cybersecurity.
- 6. – A type of malicious software that replicates itself and spreads to other systems.
- 8. – A network security system that monitors and controls incoming and outgoing network traffic.
- 12. – Malicious software designed to gather information about a person or organization without their knowledge.
- 14. – Strong and reliable, often used to describe a system that can withstand attacks or failures.
