cybersecurity dylan

12345678910111213141516171819202122
Across
  1. 2. Encrypts files and demands payment
  2. 8. User education against threats
  3. 11. Set of security rules
  4. 13. Creates a digital fingerprint of data
  5. 16. Detects and removes malware
  6. 17. Steps to handle a cyberattack
  7. 18. Replaces sensitive data with tokens
  8. 20. Security barrier between internal and external networks
  9. 21. Code that takes advantage of a vulnerability
  10. 22. Attack that makes a service unavailable
Down
  1. 1. Unauthorized data exposure
  2. 3. Social engineering attack via fake messages
  3. 4. Multi-Factor Authentication
  4. 5. Compromise of system or information
  5. 6. Install latest security patches
  6. 7. Data copy for recovery
  7. 9. The process of transforming data into ciphertext
  8. 10. Malicious software such as viruses or trojans
  9. 12. Everyday security best practices
  10. 14. Restricts user permissions
  11. 15. Secret key to access accounts
  12. 19. Verifies the identity of a user or system