Cybersecurity Awareness - Security at Home

12345678910
Across
  1. 3. The process of identifying, evaluating, and prioritizing risks to organizational assets.
  2. 6. Protection of devices like laptops, desktops, and mobile phones from cyber threats.
  3. 7. Determines what an authenticated user is allowed to do within a system.
  4. 8. is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.
  5. 9. A system that aggregates and analyzes security data from across an organization to detect threats and support incident response.
  6. 10. A vulnerability that is unknown to the vendor and has no patch available, often exploited quickly by attackers.
Down
  1. 1. Routine practices and steps users take to maintain system health and improve security.
  2. 2. A weakness in a system or application that can be exploited by attackers to gain unauthorized access or cause damage.
  3. 4. Manipulating people into divulging confidential information or performing actions that compromise security.
  4. 5. Mechanisms that restrict access to systems, data, and resources based on user roles and permissions.