Cyber Security Awareness

1234567891011121314151617181920
Across
  1. 2. Ethical hacker.
  2. 3. Network of compromised devices
  3. 6. Software to detect and remove threats.
  4. 9. Redirecting website traffic
  5. 10. Software that tracks user behavior.
  6. 12. Digital crime investigation.
  7. 14. Self-replicating malicious software.
  8. 15. Software that records keystrokes
  9. 16. Security barrier for online threats.
  10. 18. Deceptive emails to steal information.
  11. 20. Hostile takeover of online activity.
Down
  1. 1. Proving your identity online.
  2. 4. Holding data hostage for money.
  3. 5. Unauthorized data access.
  4. 7. Unauthorized entry into a system.
  5. 8. Security event or occurrence.
  6. 11. Weakness that can be exploited.
  7. 13. Faking an identity online.
  8. 17. Method to make data unreadable without a key.
  9. 19. Harmful software.