Cyber Security Puzzle

1234567891011121314151617181920
Across
  1. 3. verifying a users identity
  2. 6. Secret key to unlock phone
  3. 7. conveying data onto a fixed value
  4. 8. part internet used for illegal activities
  5. 9. Self replicating malware
  6. 13. Cyberattack that trick's people
  7. 15. Program with hidden harmful intent
  8. 16. Secure network connection
  9. 17. Network devices protection
  10. 18. unauthorized access exploit
  11. 19. Securing data by converting to a code
Down
  1. 1. software that is designed to harm
  2. 2. the harmful portion of malware
  3. 4. Unauthorized access to data
  4. 5. A network of computers that have been infected
  5. 10. malware that locks data until paid
  6. 11. software that collects users data
  7. 12. software that removes malware
  8. 14. Taking advantage of a security vulnerability
  9. 20. a software update that fixes bugs