cyber security

12345678910111213141516171819
Across
  1. 4. A fake email scam designed to steal personal information.
  2. 5. Unauthorized access to sensitive systems or data.
  3. 7. Software or hardware that records everything typed.
  4. 10. An update that fixes security vulnerabilities in software.
  5. 13. A network of compromised computers controlled remotely.
  6. 14. Malware that attaches to files and spreads when they open.
  7. 16. Malware disguised as legitimate software.
  8. 18. A vulnerability that hackers exploit before it’s patched.
  9. 19. General term for malicious software.
Down
  1. 1. The process of converting data into a secret code.
  2. 2. Attack that overwhelms a system with massive fake traffic.
  3. 3. Software that secretly gathers user information.
  4. 5. Hidden access point into a system left by attackers.
  5. 6. Malware that hides itself deep in the operating system.
  6. 8. Code or tool that takes advantage of a vulnerability.
  7. 9. Login method requiring two forms of authentication.
  8. 11. One-way process of turning data into a fixed-length string.
  9. 12. Self-replicating program that spreads without human help.
  10. 15. Malware that locks files and demands payment.
  11. 17. Network security system that blocks unauthorized access.