cybersecurity

12345678910
Across
  1. 2. malware that is designed to steal personal information, such as passwords , CC numbers
  2. 4. A process of identifying, assessing, and mitigating security risks
  3. 5. A set of rules & procedures that govern the security of an organization's information systems.
  4. 7. A system that prevents unauthorized access to a computer network
  5. 9. Type of attack that attempts to trick users into revealing confidential information
  6. 10. The process of verifying the identity of a user or device
Down
  1. 1. process of granting access to resources based on a user's identity and permissions
  2. 3. Encrypts a victim's files and demands payment to decrypt them
  3. 6. Control to protect integrity of information
  4. 8. A system that monitors a network for suspicious activity