Cybersecurity Crossword

1234567891011121314151617181920
Across
  1. 1. – A type of malware that replicates itself by infecting other programs.
  2. 3. – A secure tunnel for internet traffic, stands for Virtual Private Network.
  3. 7. – A network security system that monitors and controls traffic.
  4. 8. – A scam using fake emails or messages to trick people into revealing information.
  5. 9. Factor – Authentication requiring more than one form of verification.
  6. 11. – A hidden method of bypassing normal authentication.
  7. 13. – Malware that locks files and demands payment.
  8. 16. – Software that detects and removes malicious programs.
  9. 17. Attack – An attempt to damage, steal, or disrupt digital systems.
  10. 18. – The practice of protecting systems, networks, and programs from attacks.
  11. 19. – The process of converting data into a secure code.
  12. 20. – A clickable reference to another webpage or document.
Down
  1. 2. – Manipulating people into revealing confidential information. _____ engineering.
  2. 4. – A secret string of characters used for authentication.
  3. 5. – Software designed to harm or exploit systems.
  4. 6. – A well-known security awareness training platform.
  5. 10. Horse – Malicious software disguised as legitimate software.
  6. 12. – Phishing conducted through SMS text messages.
  7. 14. – Technology simulating human intelligence, used in modern cybersecurity.
  8. 15. – The process of verifying identity before granting access.