Hacktober

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 3. malicious software that locks users out of their systems until a ransom is paid
  2. 4. information about potential or ongoing cyber threats
  3. 6. a secret word or phrase used to authenticate access to a system
  4. 7. a digital document used to verify the identity of a user or device
  5. 8. fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
  6. 10. software that detects and removes malware
  7. 12. a secure environment used to isolate untrusted programs
  8. 14. converting data into a fixed-size value, often used in password storage
  9. 15. a network of infected computers controlled remotely by an attacker
  10. 17. a physical or digital device used to authenticate identity
  11. 18. the potential for loss or damage when a threat exploits a vulnerability
  12. 21. analysis of digital evidence to investigate security incidents
  13. 22. a weakness in a system that can be exploited by attackers
  14. 26. penetration test, used to simulate attacks on a system to find vulnerabilities
  15. 28. software that secretly gathers information about users without consent
  16. 31. a vulnerability in software that is exploited before the vendor is aware
  17. 32. security operations center, a team responsible for monitoring and defending systems
  18. 33. an actor or event that can cause harm to a system
  19. 34. fraudulent attempt to obtain sensitive information through email or websites
  20. 36. a self-replicating malware that spreads across networks
  21. 37. a trusted person within an organization who poses a security risk
  22. 38. following laws and regulations regarding data security and privacy
Down
  1. 1. systematic examination of security controls and processes
  2. 2. software designed to damage or disrupt computer systems
  3. 5. process of verifying the identity of a user
  4. 9. a security system that controls network traffic based on predetermined rules
  5. 11. a list of approved entities that are granted access to a system or network
  6. 13. distributed denial of service, an attack that overwhelms a system with traffic
  7. 16. a type of malware disguised as legitimate software
  8. 19. multi-factor authentication, requiring two or more methods to verify identity
  9. 20. a network security system that monitors and controls incoming and outgoing traffic
  10. 23. process of converting data into a coded form to prevent unauthorized access
  11. 24. an incident where data is accessed without authorization
  12. 25. intrusion detection system, designed to detect malicious activity
  13. 27. software that records keystrokes to steal sensitive information
  14. 28. pretending to be someone else or a legitimate service to deceive others
  15. 29. system used to monitor and analyze security events in real-time
  16. 30. a software update that fixes bugs and vulnerabilities
  17. 35. transforming data into a fixed-size value, commonly used in authentication
  18. 39. identity and access management, used to control user permissions