Cybersecurity

1234567891011121314151617181920
Across
  1. 3. cybersecurity professionals who identify and fix security vulnerabilities
  2. 7. collect and transmit private user information
  3. 8. creates and stores strong passwords
  4. 9. exploits a new vulnerability in software
  5. 11. prevents unauthorized changes to a system’s settings and files
  6. 16. software that combats malware infections
  7. 17. codes that protect data during encryption
  8. 19. floods a website or server with traffic
  9. 20. a network of compromised computers
Down
  1. 1. ubiquitous access points using wireless hotspots
  2. 2. tricks users into clicking on hidden elements
  3. 4. looks safe, but isn't
  4. 5. a secure service that connects remotely to another network
  5. 6. training to protect sensitive information from cyber-attacks.
  6. 10. they illegally exploit network vulnerabilities to gain unauthorized access
  7. 12. blocks unauthorized access to or from a computer network
  8. 13. steals sensitive information or gains access
  9. 14. fake email that fools users into providing information
  10. 15. scrambles data to prevent unauthorized access
  11. 18. locks users out of their computer for a ransom