cyberscurity puzzule

123456789101112131415161718192021
Across
  1. 1. - Copy of data stored separately for recovery in case of loss.
  2. 3. - Process of converting data into a format that cannot be easily accessed by unauthorized users.
  3. 5. - Device or node connected to a network.
  4. 7. - Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  5. 8. - Malware that encrypts files and demands payment for their release.
  6. 13. - Vulnerability that is exploited before the vendor releases a patch.
  7. 16. - Unforeseen event that disrupts normal operations and compromises security.
  8. 18. - Fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  9. 19. - Network security system that monitors and controls incoming and outgoing network traffic.
  10. 21. - Set of rules and procedures governing how an organization manages and protects its data.
Down
  1. 2. - Testing method used to identify security weaknesses in a system
  2. 4. - Weakness in a system that can be exploited by threats to compromise security.
  3. 6. - Authentication method requiring two forms of identification for access.
  4. 9. - Software designed to detect and remove malicious software.
  5. 10. - Segmentation - Dividing a network into smaller segments to reduce attack surface.
  6. 11. - of Service (DoS) - Attack that disrupts services by overwhelming a system with traffic.
  7. 12. - Update to a computer program or its supporting data designed to fix or improve it.
  8. 14. - Process of verifying the identity of a user or system.
  9. 15. - Engineering tactic that manipulates individuals into divulging confidential information.
  10. 17. - Breach - Unauthorized access to sensitive or confidential information.
  11. 20. - Unauthorized access to a computer system or network.