Security Champion Contest - 2024

1234567891011
Across
  1. 5. An unauthorized access event
  2. 7. A security feature that restricts access based on user identity
  3. 9. The act of disguising communication from an unknown source as trustworthy
  4. 10. A type of attack pretending to be someone else to steal data
  5. 11. A security process that requires atleast two forms of authentication to access a network
Down
  1. 1. A flaw in the application or system that can be exploited to gain unauthorized access
  2. 2. a way of scrambling data so that only authorized parties can understand the information
  3. 3. A malicious program that replicates itself
  4. 4. A type of attack that manipulates people into giving away confidential information
  5. 6. A type of malware that demands ransom
  6. 8. Protection against web-based threats