Cybersecurity terminology challenge

12345678910111213141516171819
Across
  1. 2. A type of wireless security encryption.
  2. 3. A network for wireless device connections.
  3. 6. Regularly saving important files.
  4. 8. Keeping applications and systems current.
  5. 9. Securing sensitive information through encryption.
  6. 10. Malicious software that locks your data and demands payment.
  7. 11. Malicious software, often used in phishing.
  8. 12. Deceptive emails with links or attachments to steal data.
  9. 13. Fixing damaged equipment or systems.
  10. 16. Mandating password usage for device access.
  11. 17. A device managing internet connections.
  12. 19. Using additional authentication steps.
Down
  1. 1. Information that requires protection due to its importance.
  2. 4. Informing relevant parties about a situation.
  3. 5. Unauthorized entry by individuals who should not have access.
  4. 7. A system of interconnected computers and devices.
  5. 8. Small removable storage devices.
  6. 14. The process of restoring normalcy after an incident.
  7. 15. Suspicious requests for sensitive information.
  8. 18. Isolate infected computers from the network.