Across
- 2. Engineering: Manipulating individuals to divulge confidential information through psychological tactics.
- 4. A software vulnerability that is exploited by attackers before the vendor releases a fix.
- 6. of Service (DoS): An attack that disrupts or prevents the normal functioning of a system or network.
- 8. Response: The process of responding to and managing the aftermath of a cybersecurity incident.
- 11. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
- 13. Software designed to harm or exploit computer systems, often delivered through malicious links or attachments.
- 15. The process of converting data into a code to prevent unauthorized access.
- 16. Weaknesses in a system that can be exploited by threats to compromise its security.
Down
- 1. Testing: Ethical hacking to identify vulnerabilities in a system before malicious attackers can exploit them.
- 3. Software designed to detect and remove malicious software from a computer.
- 5. The process of verifying the identity of a user, system, or device.
- 7. Security: Security measures to protect network endpoints, such as computers and mobile devices.
- 9. Authentication (2FA): A security process in which a user provides two different authentication factors to verify their identity.
- 10. A network security device that monitors and controls incoming and outgoing network traffic.
- 12. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- 14. A software update designed to fix vulnerabilities or improve security.