CrosswordMint
NIA 500 Cybersecurity Foundations
Moderate difficulty suitable for most players
1
2
3
4
5
6
7
8
9
10
11
Across
  • 1. Deceptive attempt to steal sensitive information
  • 2. Permission to use or interact with a system
  • 4. Verified as genuine or legitimate
  • 7. Set of rules for network communication
  • 8. Network barrier that blocks unauthorized access
Down
  • 3. Formal review of security controls and policies
  • 5. Susceptible to security threats or attacks
  • 6. Update to fix software vulnerabilities
  • 9. Unauthorized entry into a protected system
  • 10. To convert data into a secure code
  • 11. Software designed to damage or disrupt systems

Similar Crossword Puzzles