Cybersecurity Awareness Month 2025
Across
- 4. Malware that attaches to files and spreads when executed
- 5. Network of infected devices, often remotely controlled
- 6. Method of converting data into a fixed-size string
- 9. Piece of code that takes advantage of a vulnerability
- 10. Hidden method of bypassing normal authentication
- 11. Software that secretly gathers data without consent
- 14. Potential cause of an unwanted incident
- 15. Self-replicating malware that spreads without user interaction
- 16. Fraudulent attempt to obtain sensitive information via email or messaging
Down
- 1. Incident where data is accessed without authorization
- 2. Type of malware disguised as a legitimate file
- 3. Process of verifying a user's identity
- 7. Impersonating another user or device to gain access
- 8. General term for malicious software
- 12. Part of malware that performs the malicious action
- 13. Stealthy type of malware designed to hide its presence