First Call Cybersecurity Challenge

1234567891011
Across
  1. 2. Deliberate actions taken by cybercriminals to compromise the integrity, confidentiality, or availability of data or systems.
  2. 5. Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems.
  3. 9. Software: Programs designed to detect, block, and remove malicious software (viruses, worms, etc.) from a computer.
  4. 10. A cyber-attack where attackers impersonate a trusted entity to trick individuals into revealing sensitive information, such as passwords or credit card numbers.
  5. 11. A documented set of rules and guidelines that govern an organization's cybersecurity practices and procedures.
Down
  1. 1. Weaknesses or flaws in a computer system or network that can be exploited by attackers to compromise security.
  2. 3. A software update that fixes security vulnerabilities and enhances the stability of an application or operating system.
  3. 4. Malware that encrypts a victim's data and demands a ransom for the decryption key.
  4. 6. Three letter acronym for a security mechanism that requires users to provide two or more forms of authentication before accessing a system, enhancing security beyond 2FA.
  5. 7. The process of converting data into a code to prevent unauthorized access or data theft.
  6. 8. A network security device or software that monitors and filters incoming and outgoing network traffic to prevent unauthorized access.