Cyber Security Awareness Month

1234567
Across
  1. 3. A network security device that monitors and filters incoming and outgoing network traffic to block unauthorized access.
  2. 5. The process of converting data into a code to prevent unauthorized access and protect data confidentiality.
  3. 7. A secret combination of characters used to authenticate and gain access to a computer system or online account.
Down
  1. 1. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity.
  2. 2. A weakness or flaw in a system's security that can be exploited by attackers to gain unauthorized access.
  3. 4. Software designed to detect, prevent, and remove malicious software (malware) from a computer or network.
  4. 6. A broad term for any software designed to harm, exploit, or infiltrate computer systems, including viruses, spyware, and ransomware.