Cybersecurity Crossword
Across
- 3. A malicious software program designed to replicate itself and spread to other system.
- 4. Malicious software designed to secretly monitor and collect user information
- 6. A security system designed to monitor, filter, and control network traffic to protect a computer or network
- 8. The process of verifying the identity of a user
- 10. A method for gaining unauthorized access or control
- 11. A secret string of characters used to authenticate a user's identity and grant access to secured systems
- 12. The use of digital platforms, such as social media or messaging services, to harass, threaten, or intimidate individuals
Down
- 1. An individual or entity that engages in harmful, malicious, or unethical behavior.
- 2. A manipulation technique used to deceive individuals into divulging confidential information or performing actions that compromise security
- 5. A type of phishing attack that specifically targets high-level executives or senior officials
- 7. A form of social engineering to deceive individuals
- 9. A program designed to detect, prevent, and remove malicious software, such as viruses, worms
- 11. The right or condition of being free from unauthorized observation or intrusion