Cyber Security

1234567891011121314151617181920
Across
  1. 1. Network of infected computers controlled remotely
  2. 3. Software that blocks unauthorized access
  3. 5. Disguised malicious program
  4. 8. Self-replicating malicious program
  5. 13. Verification of identity
  6. 15. Unauthorized access to data
  7. 16. A scam to steal sensitive information via email
  8. 18. Tool that records keystrokes
  9. 19. Secret combination of characters used for access
  10. 20. Malicious software that spreads across systems
Down
  1. 2. Code that takes advantage of a system weakness
  2. 4. Malware that demands money to restore access
  3. 6. Attack targeting computer systems
  4. 7. Software that secretly monitors activity
  5. 9. Program designed to detect malicious software
  6. 10. Software update fixing security vulnerabilities
  7. 11. Malicious software designed to self-replicate
  8. 12. Process of converting data into a coded form
  9. 14. Secure private connection over the Internet
  10. 17. Someone who breaks into computer systems