Cyber-security terms

12345678910111213141516171819
Across
  1. 5. Detects computer viruses.
  2. 6. Trial and error hacking method to crack passwords, encryption keys, and any sensitive information.
  3. 8. Proving the identity of the user is correct.
  4. 10. Virus that infects multiple computers simultaneously.
  5. 12. Tricks such as fake emails, phone calls, and text messages used by attackers to get sensitive information.
  6. 16. Hackers use to spy on your computer activities.
  7. 17. Attackers that can evade security systems using a secret entryway.
  8. 18. Locks's your files and demands for a payment to unlock it.
  9. 19. Online computing vs physical hardware.
Down
  1. 1. Learning algorithms that are made to complete a goal.
  2. 2. Manages who's able to access data.
  3. 3. Misleading link disguised as something else.
  4. 4. Software designed to harms computer systems.
  5. 7. Lost or stolen information from a system.
  6. 9. A key that only authorized parties can access data to the original format.
  7. 10. Chain of blocks that holds data, linked together by strong locks.
  8. 11. Network security made to control, filter, and monitor network traffic.
  9. 13. Labels assigned to devices that are connected to the internet.
  10. 14. Unwanted installed ads or pop-ups on your computer.
  11. 15. Server attack that causes extreme lag.