Cybersecurity Crossword

123456789101112
Across
  1. 6. A weakness in a system that can be exploited by attackers.
  2. 7. A broad term encompassing any malicious software designed to damage or disable computer systems.
  3. 8. The process of verifying the identity of a user or system
  4. 9. Engineering The art of manipulating people into divulging confidential information.
  5. 11. A type of malware that encrypts a victim's files and demands a ransom for their release.
  6. 12. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in electronic communication
Down
  1. 1. The process of converting data into a code to prevent unauthorized access.
  2. 2. authentication An extra layer of security requiring users to provide two or more verification factors.
  3. 3. A type of malware that secretly gathers information about a user's activities
  4. 4. An attempt to damage or disrupt computer systems or networks.
  5. 5. A security system that controls network traffic based on predetermined security rules.
  6. 10. Detection System (IDS) A system that monitors network traffic for suspicious activity.