Cyber Security Crossword

12345678910
Across
  1. 3. The moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network
  2. 4. A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic
  3. 7. A software that scans a device or a network to detect security threats
  4. 8. A flaw or weakness that can be used to attack a system or organization
  5. 9. The process of encoding data to prevent theft by ensuring the data can only be accessed with a key
Down
  1. 1. An audio or video clip that has been edited and manipulated to seem real or believable
  2. 2. A wide range of scams when someone impersonates themselves as trustworthy entities in an attempt to obtain information
  3. 5. A secret word or phrase that is used to access a computer system or service
  4. 6. A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”
  5. 10. An internet version of a home address for your computer