Cybersecurity - JMcBride

1234567891011121314151617181920
Across
  1. 1. general term for malicious software
  2. 3. person who breaks into computer systems
  3. 6. malware that locks files and demands payment
  4. 7. software that hides malware from detection
  5. 10. network security system that monitors and controls traffic
  6. 11. secret string used for user authentication
  7. 14. vulnerability unknown to the software maker
  8. 16. authentication method using two forms of verification
  9. 17. secure tunnel for internet traffic (abbreviation)
  10. 18. code that takes advantage of a software vulnerability
  11. 20. deceptive attempt to steal sensitive information via email or messages
Down
  1. 2. process of converting data into a secure code
  2. 4. barrier that blocks unauthorized network access
  3. 5. software that detects and removes malicious programs
  4. 8. tool that records everything typed on a keyboard
  5. 9. hidden way to bypass normal authentication
  6. 12. software that secretly gathers user data
  7. 13. malware disguised as legitimate software
  8. 15. network of infected devices under hacker control
  9. 19. software update that fixes security vulnerabilities