Cybersecurity Basics

123456789
Across
  1. 1. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  2. 7. An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
  3. 8. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. 9. An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
Down
  1. 2. A security process that verifies the identity of a user or device attempting to access a system.
  2. 3. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  3. 4. The process of converting information or data into a code, especially to prevent unauthorized access.
  4. 5. A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
  5. 6. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  6. 7. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.