Cybersecurity Crossword Puzzle
Across
- 1. Hackers engaging in illegal activities.
- 4. Fraudulent attempt to steal data.
- 5. Overloading systems by traffic flood.
- 8. Manipulating people for sensitive data.
- 10. Converting data into a secure format.
- 11. Malware that demands payment for release.
- 13. A weakness in system security.
- 14. Malicious software disguised as useful.
- 16. Advanced Wi-Fi security proticol.
- 18. Trying all possible combinations to crack passwords.
- 19. Unauthorized access to confidential data.
- 20. Malicious software designed for harm.
Down
- 2. Verifying user identity through credentials.
- 3. Maliciouse code that replicates and spreads.
- 6. Virtual Private Network for encrypted connections.
- 7. Ethical hackers who improve security.
- 9. Software that detects and removes malware.
- 12. Software that secretly gathers information.
- 15. Network security to monitor traffic.
- 17. Update fixing security flaws or bugs.