Cybersecurity Crossword
Across
- 2. The process of returning data to its original condition after loss or damage.
- 4. A network of private computers infected with malicious software and controlled as a group.
- 6. Malicious software that misleads users of its true intent.
- 7. A secret word or phrase used to gain access to a system.
- 9. Abbreviation for a service that encrypts your internet connection for privacy.
- 12. The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- 13. A network security system that monitors and controls incoming and outgoing network traffic.
- 15. An incident where data is accessed without authorization.
- 18. Malware that threatens to publish the victim's data or block access unless a ransom is paid.
- 20. Software that enables a user to obtain covert information about another's computer activities.
Down
- 1. The process of verifying the identity of a user or process.
- 3. A malicious program that replicates itself and spreads to other computers.
- 5. The process of converting information into code to prevent unauthorized access.
- 8. Software designed to detect and destroy computer viruses.
- 10. Software that automatically displays or downloads advertising material.
- 11. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
- 14. Irrelevant or unsolicited messages sent over the internet.
- 16. A copy of data stored separately for recovery in case the original is lost or damaged.
- 17. A program that records every keystroke made by a user.
- 19. Abbreviation for a protocol for establishing authenticated and encrypted links between networked computers.