Cybersecurity

12345678910111213141516
Across
  1. 1. Protection against unauthorized access to personal data
  2. 5. A type of malware that encrypts data and demands payment for the decryption key
  3. 9. The process of checking the identity of a user, device, or entity
  4. 11. A secure gateway that controls traffic between an internal network and the internet
  5. 13. Software designed to detect, prevent, and remove malware
  6. 15. Process of converting data into a secret code to prevent unauthorized access
  7. 16. The secure process of logging into a system with two layers of security
Down
  1. 2. The practice of attempting to gain unauthorized access to networks by breaking into systems
  2. 3. Type of security that protects the flow of data on the internet
  3. 4. A malicious program designed to harm or exploit any programmable device
  4. 6. The most common method used by hackers to steal sensitive information through email
  5. 7. Unauthorized access to a computer system to steal or manipulate data
  6. 8. A cyber attack that floods a network or service to overwhelm it and make it unavailable
  7. 10. A weakness or flaw in a computer system that can be exploited by hackers
  8. 12. The study of secure communication in the presence of adversaries
  9. 14. An attack where an adversary impersonates another user to gain information