Cyber Security

123456789101112131415161718
Across
  1. 2. Malware hidden inside legitimate software
  2. 5. Testing a system for weaknesses
  3. 7. Type of injection attack targeting databases
  4. 9. Spreads across a network by itself
  5. 10. Trial-and-error password attack
  6. 14. Monitoring unsecure WiFi traffic
  7. 15. Attack that floods a server with traffic
  8. 16. Monitors and filters network traffic
  9. 17. Fake email scam to steal information
  10. 18. Secret string used to log in
Down
  1. 1. A network of devices used for DOS attack
  2. 3. Scrambles data to keep it secure
  3. 4. Generic term for harmful software
  4. 6. Software that detects and removes malware
  5. 7. Secretly collects user data
  6. 8. Verifying a user’s identity
  7. 11. Code used to substitute characters
  8. 12. Encrypts files and demands payment
  9. 13. Malware that needs a host file to spread