October Security Summit Wordsearch (Harder)

Edit Answers
XCUBFKPEPBOCDBEQVIKA DMALWARESRITJIPWRHBP BNYQBXIATEIENUYMYLIA REKBDUKBAASVMSPAMNOS VUZYOMYPNCMDAAOPNDMS IMXPMWYZDHHBCCIURQEW DADNADQZAVFIVKYLVATO HQWAIIFIREWALLNFCNRR UWBRNRNYDIMSACCESSID QAUTHORIZEDEADQVXNCS YJSHPRETPSGNCYOCWSSV IENCRYPTIONSCAMMERQI NVJWIGDTNRCIEFIOVIHS TVULLNKUEAWTPOPCKFYH ESMOOIIIXORITQTAAMVI GVQHWHNXEYVVAFJQTAVN RZQAPSRZVOMEBACXTVVG IZVTPIEEWDLTLESHALUA TDLWCHJTJOSAEVWCCTAU YWIYAPNHNMSURJAMKIML
1.
The prevention of improper data modification or destruction and includes ensuring data non-repudiation and authenticity?
2.
A process of transforming data to an unintelligible form to avoid unauthorized access?
3.
A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization?
4.
What term refers to malicious software designed to harm or disrupt computer systems?
5.
What is the fraudulent practice of making phone calls to trick individuals into revealing personal information?
6.
What cyberattack method uses deceptive emails to trick recipients into revealing sensitive information?
7.
What word describes a security incident where unauthorized access to data occurs?
8.
What term means having permission or approval to access something?
9.
What concept relates to the protection of personal information from unauthorized access?
10.
What do you call unsolicited and often irrelevant or inappropriate messages sent over the internet?
11.
What is the unique address used to identify a location on the internet?
12.
What term refers to the ability to enter or use a system, service, or area?
13.
What electronic communication method is commonly used for sending messages and files?
14.
What word describes someone who engages in fraudulent schemes to deceive others?
15.
What technology uses unique physical or behavioral characteristics for authentication?
16.
What term describes a widely accepted or established norm or specification?
17.
What is the intentional act of attempting to harm or exploit a system or individual?
18.
What security device or software is used to protect a network by filtering incoming and outgoing traffic?
19.
What word describes information that requires special protection due to its confidential nature?
20.
What term means meeting an established standard or being within a permissible range?