Cybersecurity

123456789101112131415161718192021222324252627282930
Across
  1. 5. Observing someone's actions to gain information
  2. 6. Attempting to acquire sensitive information
  3. 9. Self-replicating malware
  4. 11. Malicious program disguised as legitimate software
  5. 12. Malicious software that blocks access to data
  6. 13. System designed to lure attackers
  7. 14. Unauthorized use of a computer for cryptocurrency mining
  8. 15. Unauthorized use of copyrighted material
  9. 18. To take advantage of a vulnerability
  10. 20. Disguising as another person or entity
  11. 24. Network of compromised computers
  12. 25. Malicious software
  13. 27. Redirecting users to a fake website
  14. 28. Phishing attack via SMS
  15. 30. Backup of data changed since last full backup
Down
  1. 1. Manipulating people to reveal information
  2. 2. Disaster recovery site with basic infrastructure
  3. 3. System for managing changes to software
  4. 4. Process of converting data into a code
  5. 7. Network of honeypots
  6. 8. Multi-factor authentication
  7. 10. Software that gathers information without consent
  8. 15. Harmful data delivered by malware
  9. 16. Disaster recovery site fully operational
  10. 17. Backup of data changed since last backup
  11. 19. Complete copy of all data
  12. 21. Pretend to be someone else
  13. 22. Attack that intercepts communication
  14. 23. Software that records keystrokes
  15. 26. Unauthorized access by following someone
  16. 29. Disaster recovery site with partial capabilities