Cybersecurity

12345678
Across
  1. 2. a technology that creates a secure, encrypted connection over a less secure network, such as the internet. It allows users to securely access a private network from a remote location.
  2. 4. It's a security software or device that monitors network or system activities for malicious activities or policy violations and produces reports to a management console. It's designed to detect and respond to potential security threats in real-time.
  3. 5. It refers to a cyberattack where the attacker floods a network, server, or website with traffic or requests, causing it to become overwhelmed and unable to respond to legitimate requests from users, thus denying service to legitimate users.
  4. 7. the process of converting data into a code to prevent unauthorized access, ensuring that only authorized parties can decrypt and access the original information.
  5. 8. a malicious and deliberate attempt to disrupt, damage, or gain unauthorized access to computer systems, networks, or data, often carried out through the use of digital tools and techniques.
Down
  1. 1. short for malicious software, refers to any software intentionally designed to cause damage to a computer, server, network, or device, or to gain unauthorized access to sensitive information.
  2. 3. a cyberattack method where fraudulent emails, messages, or websites are used to deceive individuals into revealing sensitive information such as passwords, credit card numbers, or personal details.
  3. 6. a security system that monitors and controls incoming and outgoing network traffic, protecting against unauthorized access and malicious activities.