CyberSec Crossword

12345678910111213141516171819202122
Across
  1. 7. A security process requiring two forms of identification
  2. 8. Malware that locks data and demands payment for release
  3. 9. The process of converting data into a coded format
  4. 11. Fraudulent attempt to obtain sensitive information via email
  5. 12. A software update that fixes security vulnerabilities
  6. 14. A security risk originating from within the organization
  7. 17. A hidden method of bypassing normal authentication
  8. 19. Software that secretly gathers user information
  9. 21. A secret word or phrase used to gain access
  10. 22. Faking the identity of a trusted source
Down
  1. 1. Unauthorized release of sensitive information
  2. 2. A malicious attempt to damage or disrupt systems
  3. 3. Tricking users into clicking something different than they think
  4. 4. Software designed to disrupt, damage, or gain unauthorized access
  5. 5. Installing the latest version of software for security and performance
  6. 6. A network of infected devices controlled remotely
  7. 10. A secure connection over the internet, often used remotely
  8. 13. A network security system that monitors and controls traffic
  9. 15. A type of malware disguised as legitimate software
  10. 16. Verifying the identity of a user or device
  11. 18. A tool that records keystrokes to steal information
  12. 19. Free from danger or threat
  13. 20. A vulnerability that is exploited before it’s known to the vendor