Across
- 5. — Secondary copy to restore data after loss or attack
- 6. — Tool that detects and removes malicious code
- 8. — Encrypted tunnel that protects traffic over untrusted networks
- 10. — Install latest software versions for security/features
- 11. — Filters network traffic by rules to block threats
- 12. — Tricking users into revealing info via fake messages
- 14. — Malicious software (virus, worm, trojan, ransomware)
- 15. — Information that needs protection from loss/theft
Down
- 1. — Scrambles data so only authorized parties can read it
- 2. — Common attack vector for scams and payloads
- 3. — Any endpoint (laptop/phone) connecting to a network
- 4. — Unsolicited/bulk messages often carrying scams
- 7. — Software fix that closes security holes
- 9. — Secret used to verify identity; should be strong/unique
- 13. — Person who exploits systems (ethical or malicious)
