Cyber Security word search

12345678910111213141516171819
Across
  1. 3. any kind of software designed to damage, or enable unauthorized access, to computer systems.
  2. 4. a form of electronic cash
  3. 7. A malicious threat to a group or organization that comes from someone within
  4. 8. A secret word or phrase that is used to access a computer system or service.
  5. 9. An internet traffic filter meant to stop unauthorized incoming.
  6. 10. A language used to create and control the content on a website
  7. 12. Programs that automatically execute tasks as ordered by the creator of the program that has infected them.
  8. 13. A hacking attack that makes the device mine cryptocurrency, in addition to its normal use.
  9. 15. it allows you to create a secure connection to another network using the internet.
  10. 17. A cyber attacker who uses software and social engineering methods to steal data and information.
  11. 18. Software that is in a constant state of updating. Intended to be convenient to the user and meant to disrupt hackers.
  12. 19. Short for denial of service, an attack that disrupts the service to waste time, effort, and money.
Down
  1. 1. Code that is embedded into the hardware of a computer.
  2. 2. A form of malicious software that disguises itself as a harmless computer program
  3. 5. The core of a computer’s operating system that houses the most essential functions of the computer.
  4. 6. When sensitive, protected, or confidential information is intentionally released to an untrusted environment.
  5. 7. Confirmation of someone's identity, either using a password or a fingerprint.
  6. 11. Creating a fake identity on a social network account
  7. 12. An error, flaw, failure in a computer program
  8. 14. is the string of numbers used to identify each computer using the internet on a network.
  9. 16. Customizable additions to software for extra functionality.