#BeCyberAware

123456789101112131415
Across
  1. 4. The day that software vendors release regular security updates.
  2. 6. Authentication based on unique physical or behavioral traits.
  3. 11. Malware that encrypts data and demands a ransom for decryption.
  4. 12. Unauthorized interception of communication.
  5. 13. Software designed to detect and remove viruses and other malware.
  6. 14. Malware that provides unauthorized access while concealing its presence.
  7. 15. Software or hardware that records keystrokes without authorization.
Down
  1. 1. A software update that fixes security vulnerabilities.
  2. 2. Illegally using a computer's resources to mine cryptocurrency.
  3. 3. A network of infected computers controlled by a single entity.
  4. 5. A decoy system designed to attract and trap attackers.
  5. 7. An attack that involves trying every possible combination to crack a password
  6. 8. The malicious part of software responsible for harmful actions.
  7. 9. Capturing and analyzing network traffic without authorization.
  8. 10. The process of converting data into a code to prevent unauthorized access.