Cybersecurity

123456789101112131415
Across
  1. 4. The regular message before it’s turned into a secret:
  2. 5. Turning the secret code back into the original message:
  3. 7. A type of malware that attaches itself to a host file and spreads when the infected file is executed:
  4. 9. The practice of protecting systems, networks, and programs from digital attacks:
  5. 11. Hiding a secret message inside something else so no one knows the message is even there:
  6. 12. Unlike viruses, this can spread independently and across computer networks:
  7. 13. This type of machine looked like a typewriter. The Germans used it to send secret military messages:
  8. 14. The secret version of the message after encryption:
  9. 15. A type of cipher where each letter in the message is shifted a certain number of places down or up the alphabet:
Down
  1. 1. Changing a message into a secret code so no one else can read it:
  2. 2. The science of writing and solving secret codes:
  3. 3. This is a type of malware that encrypts files or locks systems and demands payment to restore access:
  4. 6. The art of writing and solving secret codes to keep information safe:
  5. 8. This disguises itself as a real program (maybe even something fun) but performs very bad activities:
  6. 10. This secretly monitors a user’s activities without the user's consent: