Cyber Security crossword puzzle

123456789101112131415
Across
  1. 2. Harmful software like viruses or worms.
  2. 5. Tricking users into revealing sensitive info.
  3. 8. Verifying a user's identity.
  4. 10. Hidden access to a system.
  5. 11. Blocks unauthorized network access.
  6. 14. Manipulating people to leak info.
  7. 15. Converts data into an irreversible code.
Down
  1. 1. Adds a second verification step.
  2. 3. Converts data into a secure code.
  3. 4. Secretly collects user data.
  4. 6. Hacked computers used for attacks.
  5. 7. Malware disguised as a normal file.
  6. 9. Locks files and demands payment.
  7. 12. Hides IP and encrypts internet traffic.
  8. 13. Attack Guessing passwords repeatedly.