Cybersecurity Crossword

12345678910111213
Across
  1. 3. is a malware aimed to corrupt or modify data on one computer before spreading to others.
  2. 4. a sequence of letters, characters, and numbers used for authentication
  3. 7. is a technique used in order to manipulate and deceive people into handing over sensitive information.
  4. 8. is a network device that determines what information is able to enter a system based on the rules in place.
  5. 9. a technique to obtain sensitive information typically through text messaging
  6. 10. is the process of encoding data so that it can only be accessed by its intended recipient.
  7. 12. the state of being exposed to the possibility of being attacked
  8. 13. is a method of attacking a computer by alternating a program while making it appear to function normally
Down
  1. 1. are the measures taken in order to protect systems and their data.
  2. 2. is a network that uses encryption in order to in order to maintain privacy.
  3. 4. a technique to obtain sensitive information typically through email.
  4. 5. a form of malware that takes control of data and holds it hostage until a ransom is paid.
  5. 6. is short for malicious software, and is any intrusive software developed to wreak havoc on systems.
  6. 11. a sequence of words used for authentication.
  7. 12. is the act of confirmation through evidence of somethings validity.