CYBER SECURITY

12345678910
Across
  1. 3. The process of converting data into a code to prevent unauthorized access.
  2. 5. Detection A system or process that monitors network traffic for suspicious activity or policy violations.
  3. 6. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  4. 7. Management The process of managing updates and patches to software to fix vulnerabilities or bugs.
  5. 9. The process of verifying the identity of a user or device, often using passwords or biometric data.
  6. 10. An incident in which unauthorized access or disclosure of sensitive data occurs.
Down
  1. 1. A weakness in a system or network that could be exploited by a threat to gain unauthorized access.
  2. 2. A type of malicious software that locks or encrypts data and demands payment for its release.
  3. 4. A type of cyberattack where fraudulent attempts are made to obtain sensitive information by disguising as a trustworthy entity.
  4. 8. Malicious software designed to harm or exploit any device or network.