Cyber Security Word Search Challenge

12345678910111213
Across
  1. 3. An update that fixes security vulnerabilities.
  2. 4. Online servers used to store data.
  3. 5. Security system that blocks or allows network traffic.
  4. 6. Malware that spreads itself without human interaction.
  5. 8. Process of converting data into a secure, unreadable format.
  6. 11. Secret word or phrase used to access accounts.
  7. 12. Malware disguised as legitimate software.
  8. 13. A vulnerability unknown to the vendor, exploited by hackers.
Down
  1. 1. Hidden access point used by attackers to bypass security.
  2. 2. Software designed to harm, exploit, or disable systems.
  3. 3. Fake emails that trick people into giving up sensitive info
  4. 7. Tool that encrypts your internet connection and hides your IP address.
  5. 9. Malware that locks files and demands payment.
  6. 10. Software that secretly monitors your activities.