Crossword Puzzle Cybersecurity Crossword ChallengeOnline version Test your knowledge of essential concepts in digital protection and information security. by Ashwith Godishala 1 A network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules. 2 Software designed to disrupt, damage, or gain unauthorized access to computer systems. 3 A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication. 4 The process of converting information or data into a code to prevent unauthorized access. 5 A type of malicious software that blocks access to a computer system until a sum of money is paid. 6 A type of malware that disguises itself as legitimate software to gain access to a user's system. 7 A weakness in a system that can be exploited by threats to gain unauthorized access or cause harm. 8 Software designed to detect and destroy computer viruses and other malicious software. 7 6 8 5 1 3 2 4 1 A network security device that monitors and controls incoming and outgoing traffic based on predetermined security rules. 2 Software designed to disrupt, damage, or gain unauthorized access to computer systems. 3 A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication. 4 The process of converting information or data into a code to prevent unauthorized access. 5 A type of malicious software that blocks access to a computer system until a sum of money is paid. 6 A type of malware that disguises itself as legitimate software to gain access to a user's system. 7 A weakness in a system that can be exploited by threats to gain unauthorized access or cause harm. 7 3 1 5 4 6 2