Cybersecurity by Hazel

123456789101112131415161718
Across
  1. 2. the process of identifying and fixing vulnerabilities on a system.
  2. 5. The smallest unit of information storage.
  3. 6. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. 8. The group responsible for defending an enterprise's use of information systems by maintaining its security posture against a group of mock attackers.
  5. 9. A list of entities that are considered trustworthy and are granted access or privileges.
  6. 10. Any unauthorized attempt to access, disrupt, steal, or damage computer systems, networks, or data.
  7. 14. A part of a computer system or network with is designed to block unauthorized access while permitting outward communication.
  8. 17. Whom someone or what something is.
  9. 18. the process of protecting electrical devices and networks from attacks.
Down
  1. 1. A part of a computer system or network which is designed to lock unauthorized access while permitting outward communication.
  2. 3. A term to describe connecting multiple separate networks together.
  3. 4. The process of storing a data file in several "chunks" or rather than in a single contiguous sequence of bits in one place on the storage medium.
  4. 7. An unexpected and relatively small defect, fault, fault, or imperfection in an information system or device.
  5. 8. A list of entities that are blocked or denied privileges.
  6. 11. A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer Encryption the process of converting information or data into a code, especially to precent unauthorized access.
  7. 12. A security incident in which sensitive, protected, or confidential information is accused, stolen, or disclosed without authorization.
  8. 13. A cryptographic algorithm for encryption and decryption.
  9. 15. A connection between two devices.
  10. 16. A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture.