Cybersecurity Awareness Month

1234567891011121314151617181920
Across
  1. 3. Function that converts data into a fixed size
  2. 5. Measures taken to protect data
  3. 6. Impersonating someone or something to deceive
  4. 8. Securing data by converting it into code
  5. 10. Software that records keystrokes
  6. 12. Software that shows unwanted ads
  7. 14. Malware that encrypts files demanding ransom
  8. 15. Attack using trial and error to guess passwords)
  9. 17. Investment scam involving fake accounts
  10. 19. Vulnerabilities exploited before being patched
  11. 20. Fraudulent attempts to steal sensitive information)
Down
  1. 1. Malicious software designed to damage systems
  2. 2. Hidden way of bypassing security controls
  3. 4. Virtual Private Network for secure connections
  4. 5. Software that collects data secretly
  5. 7. Online harassment or bullying
  6. 9. Multi-Factor Authentication
  7. 11. Self-replicating malware that spreads across networks)
  8. 13. Image, video or audio generated by AI
  9. 16. A system that protects networks
  10. 18. Network of compromised computers under attacker control)
  11. 20. Software update to fix security vulnerabilities