Cyber-Word

12345678910111213141516171819202122232425
Across
  1. 4. – Scrambles data for protection.
  2. 6. Control – Restricts system resource usage.
  3. 8. – Hidden entry point for attackers.
  4. 10. Cracking – Breaking user password security.
  5. 13. Email – Fraudulent message attempting data theft.
  6. 14. – Network of infected devices.
  7. 16. – Unauthorized system intruder.
  8. 17. Injection – Malicious database manipulation.
  9. 19. Horse – Malicious software disguised as useful.
  10. 20. – Local area network.
  11. 21. – Fraudulent attempt to steal data.
  12. 22. – Secure internet connection.
  13. 24. Detection – Monitors for suspicious activity.
  14. 25. – Exploit discovered before patch.
Down
  1. 1. – Holds data hostage for ransom.
  2. 2. – Detects and removes harmful software.
  3. 3. – Wireless local area network.
  4. 5. – Software for malicious purposes.
  5. 7. Security – Protects data in the cloud.
  6. 9. – Overloads system with traffic.
  7. 11. – Identifier for wireless networks.
  8. 12. – Blocks unauthorized network access.
  9. 15. Testing – Simulated cyberattack for security testing.
  10. 18. – Converts data into fixed-length.
  11. 23. Server – Acts as an intermediary.