Cybersecurity terminology challenge

1234567891011121314151617181920
Across
  1. 3. authentication: Using additional authentication steps.
  2. 5. Data: Information that requires protection due to its importance.
  3. 7. devices: Securing sensitive information through encryption.
  4. 11. A system of interconnected computers and devices.
  5. 12. Fixing damaged equipment or systems.
  6. 13. backup: Regularly saving important files.
  7. 15. Malicious software, often used in phishing.
  8. 16. passwords: Mandating password usage for device access.
  9. 20. network: A network for wireless device connections.
Down
  1. 1. Malicious software that locks your data and demands payment.
  2. 2. Isolate infected computers from the network.
  3. 4. attempt: Suspicious requests for sensitive information.
  4. 6. Informing relevant parties about a situation.
  5. 8. software: Keeping applications and systems current.
  6. 9. The process of restoring normalcy after an incident.
  7. 10. Personnel Access: Unauthorized entry by individuals who should not have access.
  8. 14. encryption: A type of wireless security encryption.
  9. 17. Drives: Small removable storage devices.
  10. 18. A device managing internet connections.
  11. 19. Deceptive emails with links or attachments to steal data.