Cyber Security

1234567891011121314151617181920212223242526272829
Across
  1. 2. A malicious code that attaches itself to clean files and spreads to other files
  2. 5. A cryptographic value used to verify data authenticity and integrity
  3. 8. Software that secretly gathers user information without permission
  4. 9. A secure connection that encrypts data between a device and a network
  5. 13. Software designed to harm or exploit any programmable device or network
  6. 14. Authentication method based on unique biological traits like fingerprints
  7. 15. An attack that floods a system with traffic, causing a denial of service
  8. 17. A software vulnerability unknown to the vendor and unpatched
  9. 18. The process of converting data into a coded form to prevent unauthorized access
  10. 21. A type of malware disguised as legitimate software
  11. 22. Malware that locks or encrypts data and demands payment to restore access
  12. 23. A network of infected computers controlled remotely by hackers
  13. 25. A secret way of bypassing normal authentication to access a system
  14. 26. A self-replicating program that spreads through networks
  15. 28. A test used to differentiate between humans and automated bots
  16. 29. System that monitors network traffic for suspicious activity
Down
  1. 1. Any attempt to damage, steal, or disrupt data or computer systems
  2. 3. Manipulating people into revealing confidential information
  3. 4. A tool used to store and manage multiple passwords securely
  4. 6. A person who gains unauthorized access to computer systems
  5. 7. Software that detects and removes malicious programs
  6. 10. The process of verifying the identity of a user or system
  7. 11. A secret word or phrase used to access a system or account
  8. 12. A cyber attack that tricks users into revealing personal information through fake emails or websites
  9. 15. The release of sensitive or confidential information to unauthorized people
  10. 16. Settings that determine what network traffic is allowed or blocked
  11. 19. An update designed to fix vulnerabilities in software
  12. 20. A distributed version of a DoS attack using multiple computers
  13. 24. The key used to encode or decode encrypted data
  14. 27. A network security system that monitors and controls incoming and outgoing traffic