Across
- 6. Structures like NIST used to manage security risk.
- 8. Software designed to damage or gain unauthorized access to a system.
- 10. A security handshake that requires at least two pieces of proof.
- 11. Top IT security role
- 13. Malware that demands payment to unlock files.
- 15. Phishing via voice or phone call.
Down
- 1. The digital sentry that monitors network traffic.
- 2. Verifying that a user is who they claim to be
- 3. AI-generated media that replaces a person's likeness.
- 4. A vulnerability that is previously unknown to the software developer.
- 5. A digital cipher that keeps data from prying eyes.
- 7. Phishing via SMS text message.
- 9. The "weakest link" in the security chain.
- 12. System generated cryptographic key pairs more secure than a password.
- 14. A digital "sit-in" that overwhelms a website’s server with fake requests.
