Perfect for beginners with simple, common vocabulary
NIA 500 Cybersecurity Foundations
Moderate difficulty suitable for most players
1
2
3
4
5
6
7
8
9
10
11
Across
- 1. Deceptive attempt to steal sensitive information
- 2. Permission to use or interact with a system
- 4. Verified as genuine or legitimate
- 7. Set of rules for network communication
- 8. Network barrier that blocks unauthorized access
Down
- 3. Formal review of security controls and policies
- 5. Susceptible to security threats or attacks
- 6. Update to fix software vulnerabilities
- 9. Unauthorized entry into a protected system
- 10. To convert data into a secure code
- 11. Software designed to damage or disrupt systems
Similar Crossword Puzzles
- Perfect for beginners with simple, common vocabulary
- Perfect for beginners with simple, common vocabulary
- Perfect for beginners with simple, common vocabulary