Cybersecurity Crossword

12345678910111213141516171819
Across
  1. 1. — Program that records keystrokes to steal information.
  2. 4. — Network security system that blocks unauthorized access.
  3. 8. — Secret way to bypass normal authentication in a system.
  4. 10. — Set of rules governing data communication on networks.
  5. 11. — Process of converting encrypted data back to readable form.
  6. 14. — Process of verifying a user's identity.
  7. 15. — Malicious program disguised as legitimate software.
  8. 17. — Software that secretly monitors user activity.
  9. 18. — Network of infected computers controlled by a hacker.
  10. 19. — Unauthorized access to a computer system.
Down
  1. 2. — Process of converting data into a secure coded form.
  2. 3. — Newly discovered vulnerability with no patch yet.
  3. 5. — Code that takes advantage of a system vulnerability.
  4. 6. — Software designed to damage or disrupt computers.
  5. 7. — Malware designed to gain hidden administrator access.
  6. 9. — Isolated environment used to test suspicious files.
  7. 10. — Scam emails or messages that try to steal passwords or personal data.
  8. 12. — Malware that locks files and demands payment.
  9. 13. — Fixed-length value used to verify data integrity.
  10. 16. — Pretending to be a trusted source in communication.