Cybersecurity Cr0$$w0rd Puzz|3

1234567891011121314151617181920
Across
  1. 2. Horse
  2. 5. Unsolicited emails
  3. 7. Taking advantage of vulnerability
  4. 8. Capture of data being transmitted
  5. 10. Malicious software
  6. 13. Challenge-response verification test
  7. 14. Process that safeguards online assets
  8. 15. Virtual perimeter around network
  9. 16. Malicious code to harm victims
  10. 17. Virtual secure corridor
  11. 18. Deletion of all or part
  12. 19. Dark web
Down
  1. 1. Infectious malware that spreads
  2. 3. Process to verify identity
  3. 4. Bypasses security steps to gain access
  4. 6. False or misleading information
  5. 8. Malware that uses scare tactics
  6. 9. Breach
  7. 11. Fraudulent acquisition of user credentials
  8. 12. Plain text into secret code
  9. 20. Malicious program to extort money