Across
- 4. A software update to fix security flaws. (5 letters)
- 7. Manipulating people to divulge confidential information. (15 letters)
- 8. Granting permissions to access resources. (13 letters)
- 9. System that monitors networks for suspicious activity. (3 letters)
- 10. Malware that encrypts files and demands payment. (11 letters)
- 11. A network security system that blocks unauthorized access. (8 letters)
- 12. Weakness in a system that can be exploited. (12 letters)
- 13. Securely connects a user to a network over the internet. (3 letters)
- 14. Exploit targeting a previously unknown vulnerability. (8 letters)
- 15. Attack that overwhelms a system with traffic to crash it. (4 letters)
Down
- 1. Security method requiring two types of verification. (10 letters, hyphenated)
- 2. Scrambling data to make it unreadable without a key. (10 letters)
- 3. Malicious software designed to harm or exploit systems. (7 letters)
- 5. Process of verifying a user’s identity. (14 letters)
- 6. Deceptive emails or messages to steal sensitive data. (8 letters)
