Cyber Security Terms
Across
- 3. Software designed to harm systems.
- 4. Permission to use a system.
- 9. Copy of data for recovery.
- 12. Device connected to a network.
- 14. Software to detect and remove malware.
- 16. Holds data hostage for payment.
- 18. Malicious software disguised as useful.
- 20. engineering, Manipulating people for information.
- 21. Converts data into fixed-size output.
- 22. Self-replicating malware that spreads.
Down
- 1. Hiding data within other data.
- 2. Period of active user interaction
- 4. Verifying user identity.
- 5. Software fix for vulnerabilities.
- 6. Remote storage and computing service.
- 7. Weakness in a system's security.
- 8. Software that displays unwanted ads.
- 10. Prevents unauthorized network access.
- 11. Self-replicating code that harms systems.
- 13. Deceptive emails to steal information.
- 15. Web address used for navigation.
- 17. Secret phrase for user authentication.
- 19. Unauthorized access to data.