Cybersecurity Crossword Puzzle

1234567891011121314151617181920
Across
  1. 2. acquiring user info through deception
  2. 3. faking transmissions to gain access
  3. 4. software that provides unwanted ads
  4. 6. process to identify user identity
  5. 7. uses external verification to login
  6. 10. unauthorized transfer of information
  7. 12. software for spying on users
  8. 13. risk-reduction controls on a system
  9. 14. collection of compromised systems
  10. 16. capability to limit network traffic
  11. 17. distributed attack on a network
  12. 19. unwanted advertising/unsolicited emails
  13. 20. everyday objects connected to internet
Down
  1. 1. malicious program you pay to unlock
  2. 2. unencrypted information
  3. 5. cypher used to protect information
  4. 8. intrusive or malicious computer software
  5. 9. software used to protect systems
  6. 11. capture of data over networks
  7. 15. test to verify if human
  8. 18. process of decoding cyphers