Cybersecurity Crossword Puzzle
Across
- 3. Unwanted email messages
- 7. Hides internet browsing activity
- 9. Software flaw exposing systems
- 11. Software detecting cyber threats
- 13. Person tricked into hacking
- 15. Secret key for authentication
- 17. Authentication requiring two factors
- 18. Tracks and records keystrokes
- 20. Deceptive attack to steal info
Down
- 1. Unauthorized code execution attack
- 2. Fake email for stealing data
- 4. Attack security vulnerabilities
- 5. Malicious software category
- 6. Scrambles data for security
- 8. Multiple accounts, one password
- 10. Cybersecurity framework for networks
- 12. Malicious program holding data hostage
- 14. Unauthorized access attempt
- 16. Digital fingerprint identifier
- 19. Cyber attack flooding network packets