Test

123456789101112131415
Across
  1. 5. — Secondary copy to restore data after loss or attack
  2. 6. — Tool that detects and removes malicious code
  3. 8. — Encrypted tunnel that protects traffic over untrusted networks
  4. 10. — Install latest software versions for security/features
  5. 11. — Filters network traffic by rules to block threats
  6. 12. — Tricking users into revealing info via fake messages
  7. 14. — Malicious software (virus, worm, trojan, ransomware)
  8. 15. — Information that needs protection from loss/theft
Down
  1. 1. — Scrambles data so only authorized parties can read it
  2. 2. — Common attack vector for scams and payloads
  3. 3. — Any endpoint (laptop/phone) connecting to a network
  4. 4. — Unsolicited/bulk messages often carrying scams
  5. 7. — Software fix that closes security holes
  6. 9. — Secret used to verify identity; should be strong/unique
  7. 13. — Person who exploits systems (ethical or malicious)