Cybersecurity Crossword Puzzle

123456789101112131415
Across
  1. 6. Structures like NIST used to manage security risk.
  2. 8. Software designed to damage or gain unauthorized access to a system.
  3. 10. A security handshake that requires at least two pieces of proof.
  4. 11. Top IT security role
  5. 13. Malware that demands payment to unlock files.
  6. 15. Phishing via voice or phone call.
Down
  1. 1. The digital sentry that monitors network traffic.
  2. 2. Verifying that a user is who they claim to be
  3. 3. AI-generated media that replaces a person's likeness.
  4. 4. A vulnerability that is previously unknown to the software developer.
  5. 5. A digital cipher that keeps data from prying eyes.
  6. 7. Phishing via SMS text message.
  7. 9. The "weakest link" in the security chain.
  8. 12. System generated cryptographic key pairs more secure than a password.
  9. 14. A digital "sit-in" that overwhelms a website’s server with fake requests.