Introduction to Cyber Security

12345678910
Across
  1. 2. An attack that takes advantage of a previously unknown vulnerability in software or hardware before the vendor has released a patch or fix.
  2. 5. The process of converting data into a code to prevent unauthorized access. Only those with the decryption key can access the original data.
  3. 6. Short for "malicious software," malware refers to any software specifically designed to harm or exploit a computer, network, or device. Examples include viruses, worms, and ransomware.
  4. 8. A weakness in a system, application, or network that can be exploited by attackers to gain unauthorized access or cause harm.
  5. 9. The manipulation or deception of individuals into divulging confidential information, often used in phishing and other types of attacks.
  6. 10. A type of malware that encrypts a victim's data and demands a ransom payment in exchange for the decryption key.
Down
  1. 1. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, designed to block unauthorized access while permitting legitimate communication.
  2. 3. The process of verifying the identity of a user, device, or system before granting access to resources. Common methods include passwords, biometrics, or multi-factor authentication (MFA).
  3. 4. A type of social engineering attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information like passwords, credit card numbers, or personal data.
  4. 7. A cyberattack aimed at disrupting the normal operation of a network or server by overwhelming it with excessive traffic, causing it to become unavailable to legitimate users.