Cyber Security Awareness Month

12345678910111213141516171819
Across
  1. 6. A security vulnerability that is unknown to the vendor and has not been patched.
  2. 7. Control Security techniques that regulate who or what can view or use resources in a computing environment.
  3. 8. Software designed to harm or exploit any programmable device or network.
  4. 11. A network security device that monitors and controls incoming and outgoing network traffic.
  5. 12. An attack that overwhelms a system with traffic from multiple sources, causing service disruption.
  6. 13. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  7. 16. The process of converting information into code to prevent unauthorized access.
  8. 17. A weakness in a system that can be exploited to compromise its security.
  9. 19. Any potential danger to information or systems.
Down
  1. 1. A type of spyware that records keystrokes to capture sensitive information.
  2. 2. The practice of collecting and analyzing digital evidence after a cybersecurity incident.
  3. 3. Software that secretly monitors user activity and collects information.
  4. 4. Engineering Manipulating people into divulging confidential information through deceptive means.
  5. 5. Breach An incident where unauthorized access to sensitive data occurs.
  6. 9. The process of verifying the identity of a user or device.
  7. 10. A type of malware that locks or encrypts a user's files, demanding a ransom for access.
  8. 13. A software update designed to fix vulnerabilities or bugs.
  9. 14. An event that has an adverse effect on the security of an information system.
  10. 15. A protocol for establishing a secure connection between a web server and a browser.
  11. 18. A network of infected devices controlled by a hacker to perform automated tasks.