Cyber Security Crossword

1234567891011121314151617181920
Across
  1. 4. when cyber criminals deceive others by acting as someone or something else. usually through email or messages
  2. 6. a security violation in which sensitive/confidential information has been accessed/stolen by an unauthorized person
  3. 7. pretending to be someone else in order to get someones personal information
  4. 9. sends signals to devices
  5. 12. someone listening to a conversation to gain personal information
  6. 13. intrusive software made by cyber criminals to damage/destroy computers and computer systems
  7. 16. checking a users credentials to see if they are allowed to access the protected information
  8. 17. any activity to protect the functionality and contents of information
  9. 18. preventing and detecting threats to protect information being stolen/tampered with
  10. 20. a device used to access the worldwide web
Down
  1. 1. manipulating or influencing someone to gain access to their computer personal information
  2. 2. monitors incoming and outgoing networking traffic
  3. 3. the programs and other operating information used by a computer
  4. 5. a type of malware that grows and spreads throughout the device inf
  5. 8. a type of malware that threatens to release personal information if they don't pay a ransom
  6. 10. securing networks by actively seeking out weaknesses in the defense
  7. 11. attackers deceiving people into revealing personal info or download malware
  8. 14. detects and destroys computer viruses
  9. 15. a computer program that can copy itself and infect a computer without the users permission/knowledge
  10. 19. a form of security in which information is converted into cypher-text