Cybersecurity Awareness Month
Across
- 3. Function that converts data into a fixed size
- 5. Measures taken to protect data
- 6. Impersonating someone or something to deceive
- 8. Securing data by converting it into code
- 10. Software that records keystrokes
- 12. Software that shows unwanted ads
- 14. Malware that encrypts files demanding ransom
- 15. Attack using trial and error to guess passwords)
- 17. Investment scam involving fake accounts
- 19. Vulnerabilities exploited before being patched
- 20. Fraudulent attempts to steal sensitive information)
Down
- 1. Malicious software designed to damage systems
- 2. Hidden way of bypassing security controls
- 4. Virtual Private Network for secure connections
- 5. Software that collects data secretly
- 7. Online harassment or bullying
- 9. Multi-Factor Authentication
- 11. Self-replicating malware that spreads across networks)
- 13. Image, video or audio generated by AI
- 16. A system that protects networks
- 18. Network of compromised computers under attacker control)
- 20. Software update to fix security vulnerabilities