Cyber security

1234567891011121314151617
Across
  1. 3. The process of verifying a user’s identity
  2. 6. Software designed to detect and remove malware
  3. 7. A security system that blocks unauthorized access to a network
  4. 11. Malware that spreads on its own across networks
  5. 12. Software designed to harm or exploit a computer system
  6. 13. Malware that hides deep in a system to avoid detection
  7. 14. A secret word or phrase used to access accounts
  8. 16. A security method requiring two forms of verification
  9. 17. Using technology to harass or harm others
Down
  1. 1. Protection of computer networks from threats
  2. 2. A scam where attackers trick users into giving personal information
  3. 4. Software that secretly collects user information
  4. 5. The trail of data you leave online
  5. 8. The process of converting data into a secret code
  6. 9. When sensitive information is exposed or stolen
  7. 10. Malware that locks files and demands payment to unlock them
  8. 15. A malicious program that spreads by attaching to files