Cybersecurity Awareness Month

1234567891011
Across
  1. 3. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments.
  2. 6. Infectious software
  3. 7. Type of attack that tricks users into revealing sensitive info
  4. 8. Type of malware that allows an attacker to remotely control a system or network
  5. 9. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
  6. 11. A type of software that is designed to damage or exploit a computer system
Down
  1. 1. Attack where an attacker gains unauthorized access to a system or network
  2. 2. Unwanted emails
  3. 4. The process of verifying the identity of a user, device, or system
  4. 5. A type of malware that demands payment in exchange for restoring access to data
  5. 6. A network that encrypts internet connections and helps secure remote access to a network
  6. 10. Creating a copy of data to prevent its loss in case of a disaster or data breach