Cyber Security

12345678910111213
Across
  1. 5. – A system designed to block unauthorized access (8)
  2. 7. – Testing method to evaluate security defenses (11)
  3. 8. – Software designed to disrupt or damage systems (7)
  4. 9. – Digital document proving ownership of a public key (11)
  5. 11. – Distributed attack that overwhelms a system with traffic (4)
  6. 12. – Fraudulent attempt to obtain sensitive information (8)
  7. 13. – Malware that demands payment to restore access (10)
Down
  1. 1. – Software that secretly monitors user activity (7)
  2. 2. – Process of converting data into a code (10)
  3. 3. – A weakness in a system that can be exploited (13)
  4. 4. force – Attack method involving trial and error (10)
  5. 6. – Process of converting data into a fixed-size value (7)
  6. 10. – A type of malware disguised as legitimate software (6)