cyber security quiz

12345678910111213141516
Across
  1. 3. A security method using fingerprints, face, or retina scans
  2. 5. A tool that records everything typed on a keyboard
  3. 7. A software that secretly monitors and collects user information
  4. 10. The process of verifying the identity of a user or device
  5. 11. Malware that locks or encrypts data and demands payment to release it
  6. 13. The process of converting data into a coded form to protect it
  7. 14. A harmful program that disguises itself as useful software
  8. 15. The illegal copying, use, or distribution of software
  9. 16. A set of rules for formatting and transmitting data over networks
Down
  1. 1. A hidden entry point used to bypass normal security
  2. 2. A protective barrier that blocks unauthorized access to or from a network
  3. 4. A group of infected computers remotely controlled by a hacker
  4. 6. A general term for any software designed to harm or exploit devices
  5. 8. The act of tricking people into revealing sensitive information online
  6. 9. A software used to detect, prevent, and remove malicious programs
  7. 12. A defined sequence of steps used to solve a problem or perform a task