Cybersecurity Crossword Puzzle

123456789101112131415161718
Across
  1. 2. A type of malware that is designed to look like a legitimate program in order to trick users into downloading it.
  2. 6. The process of simplifying complex systems by focusing on essential features, hiding unnecessary details.
  3. 8. A malicious program that can self-replicate and attach itself to other files.
  4. 12. A symbol, typically '=', used in programming to assign a value to a variable.
  5. 13. The practice of protecting computers, servers, mobile devices, and networks from malicious attacks.
  6. 14. A value or variable that is passed to a function or method when it is called.
  7. 16. A software that generates revenue by automatically displaying online advertisements.
  8. 17. To verify the identity of a user or system.
Down
  1. 1. A program or set of rules that protects a network by controlling incoming and outgoing traffic.
  2. 3. An additional component or feature that can be added to a software program.
  3. 4. A software program used to prevent, detect, and remove malware.
  4. 5. CONTROL - A security process that controls and manages who is authorized to access certain resources.
  5. 7. A malicious program that is designed to damage or gain unauthorized access to a computer system.
  6. 9. The act of sending fraudulent emails in order to trick people into revealing personal information.
  7. 10. The sum of all possible points where an unauthorized user can try to enter or extract data from a system.
  8. 11. POISONING - A type of cyber attack that involves sending false ARP messages to redirect network traffic.
  9. 12. A character encoding standard used to represent text in computers.
  10. 15. A protocol used to translate IP addresses into MAC addresses.
  11. 18. A collection of IP-to-MAC address mappings used to speed up network communication.