Cybersecurity Crossword
Across
- 1. – A type of malware that replicates itself by infecting other programs.
- 3. – A secure tunnel for internet traffic, stands for Virtual Private Network.
- 7. – A network security system that monitors and controls traffic.
- 8. – A scam using fake emails or messages to trick people into revealing information.
- 9. Factor – Authentication requiring more than one form of verification.
- 11. – A hidden method of bypassing normal authentication.
- 13. – Malware that locks files and demands payment.
- 16. – Software that detects and removes malicious programs.
- 17. Attack – An attempt to damage, steal, or disrupt digital systems.
- 18. – The practice of protecting systems, networks, and programs from attacks.
- 19. – The process of converting data into a secure code.
- 20. – A clickable reference to another webpage or document.
Down
- 2. – Manipulating people into revealing confidential information. _____ engineering.
- 4. – A secret string of characters used for authentication.
- 5. – Software designed to harm or exploit systems.
- 6. – A well-known security awareness training platform.
- 10. Horse – Malicious software disguised as legitimate software.
- 12. – Phishing conducted through SMS text messages.
- 14. – Technology simulating human intelligence, used in modern cybersecurity.
- 15. – The process of verifying identity before granting access.