Cyber-Word
Across
- 4. – Scrambles data for protection.
- 6. Control – Restricts system resource usage.
- 8. – Hidden entry point for attackers.
- 10. Cracking – Breaking user password security.
- 13. Email – Fraudulent message attempting data theft.
- 14. – Network of infected devices.
- 16. – Unauthorized system intruder.
- 17. Injection – Malicious database manipulation.
- 19. Horse – Malicious software disguised as useful.
- 20. – Local area network.
- 21. – Fraudulent attempt to steal data.
- 22. – Secure internet connection.
- 24. Detection – Monitors for suspicious activity.
- 25. – Exploit discovered before patch.
Down
- 1. – Holds data hostage for ransom.
- 2. – Detects and removes harmful software.
- 3. – Wireless local area network.
- 5. – Software for malicious purposes.
- 7. Security – Protects data in the cloud.
- 9. – Overloads system with traffic.
- 11. – Identifier for wireless networks.
- 12. – Blocks unauthorized network access.
- 15. Testing – Simulated cyberattack for security testing.
- 18. – Converts data into fixed-length.
- 23. Server – Acts as an intermediary.