Cybersecurity Awareness Month 2025

12345678910111213141516
Across
  1. 4. Malware that attaches to files and spreads when executed
  2. 5. Network of infected devices, often remotely controlled
  3. 6. Method of converting data into a fixed-size string
  4. 9. Piece of code that takes advantage of a vulnerability
  5. 10. Hidden method of bypassing normal authentication
  6. 11. Software that secretly gathers data without consent
  7. 14. Potential cause of an unwanted incident
  8. 15. Self-replicating malware that spreads without user interaction
  9. 16. Fraudulent attempt to obtain sensitive information via email or messaging
Down
  1. 1. Incident where data is accessed without authorization
  2. 2. Type of malware disguised as a legitimate file
  3. 3. Process of verifying a user's identity
  4. 7. Impersonating another user or device to gain access
  5. 8. General term for malicious software
  6. 12. Part of malware that performs the malicious action
  7. 13. Stealthy type of malware designed to hide its presence