Cyber Security Week

12345678
Across
  1. 2. What type of malicious software is designed to block access to a computer system until a sum of money is paid?
  2. 3. What is the exploitation of multiple security vulnerabilities in a system to gain unauthorized access?
  3. 4. What is the process of converting information into a code to prevent unauthorized access?
  4. 5. What is a secret combination of letters, numbers, and symbols used to access a system or account?
  5. 6. What is the practice of protecting systems, networks, and programs from digital attacks?
  6. 7. What is the practice of regularly updating software and systems to protect against known vulnerabilities?
  7. 8. What type of software is designed to block unauthorized access while permitting authorized communication?
Down
  1. 1. What is the act of pretending to be someone else to deceive or gain access to information?
  2. 5. What is a deceptive email or website designed to trick individuals into revealing personal information?
  3. 7. What is a set of security rules and policies that govern the use of an organization's information technology resources?