Cybersecurity

1234567891011121314151617
Across
  1. 2. A group of interconnected computers that share resources and information.
  2. 3. Malicious code that replicates itself by modifying other computer programs.
  3. 4. A hidden method for bypassing normal authentication in a computer system.
  4. 6. Software that secretly collects user information without their knowledge.
  5. 8. A network security device that monitors and filters incoming and outgoing network traffic.
  6. 9. Distributed Denial of Service, an attack that overwhelms a network with traffic.
  7. 10. A technique used to trick users into providing sensitive information by pretending to be a trustworthy entity.
  8. 12. A vulnerability that is exploited before the software developer is aware.
  9. 13. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
  10. 14. Software that displays unwanted advertisements on a user’s device.
  11. 16. Personally Identifiable Information, data that can identify an individual.
  12. 17. Malicious software disguised as legitimate software to deceive users.
Down
  1. 1. The process of converting information into code to prevent unauthorized access.
  2. 5. A program that records every keystroke made by a user.
  3. 7. Malware that encrypts files, demanding ransom payment for decryption keys.
  4. 11. Unauthorized entry into a computer system or network.
  5. 15. A set of tools that enables unauthorized access to a computer while hiding its presence.