Cybersecurity Terms

12345678910111213141516171819
Across
  1. 2. Impersonation of another device or user on a network.
  2. 4. A secret key that protects your digital accounts.
  3. 7. Secret agents in software form, spying on your computer activities.
  4. 8. A process to confirm someone is who they claim to be.
  5. 10. A weakness in a system that can be exploited.
  6. 12. A secure tunnel for data on the internet.
  7. 14. A coding error that might cause programs to behave unexpectedly.
  8. 15. A person who breaks into computers, often for malicious reasons.
  9. 17. Malicious software disguised as legitimate.
  10. 18. A digital kidnapper of data, demanding payment for release.
  11. 19. Scrambling data to protect it from prying eyes.
Down
  1. 1. Ensuring that authorized parties can access information when needed.
  2. 3. A digital barrier protecting a network from unauthorized access.
  3. 4. A deceptive attempt to steal sensitive information via email.
  4. 5. Manipulation techniques to trick people into breaking security procedures.
  5. 6. Unwanted software that displays ads on your screen.
  6. 9. Protection against unauthorized data alteration.
  7. 11. This program defends your computer against malicious agents.
  8. 13. Malicious software designed to harm or exploit any programmable device.
  9. 14. Network of computers infected with malicious software intented to cause harm.
  10. 16. A self-replicating program that spreads through networks.