Cybersecurity Puzzle
Across
- 2. Self-replicating malicious software
- 3. Fixes security vulnerabilities
- 5. Acts as an intermediary server
- 6. Fake emails to steal info
- 7. Attack using trial and error
- 9. Program that spreads and harms
- 11. Remote storage and computing
- 13. Harmful software for attacks
- 14. Access to an account or system
- 15. Device used for entering codes
- 18. Payment demanded for files
- 20. Secretly monitors user activity
Down
- 1. Superuser access level
- 4. Method for encrypting information
- 8. Disguised harmful software
- 10. Protection against cyber threats
- 12. Secret entry point for attacks
- 16. Permission to use a system
- 17. Unauthorized access to systems
- 19. Encrypts data for protection