Cybersecurity Terms

1234567891011121314151617181920
Across
  1. 2. Encoding data for security reasons
  2. 4. Harmful software that damages computers
  3. 5. Unauthorized access to data
  4. 9. Falsifying identity or source
  5. 10. Software that monitors for malware
  6. 11. Algorithm for encrypting data
  7. 12. Network entry point for traffic
  8. 16. Access granted to perform actions
  9. 17. Ethical hacking to find vulnerabilities
  10. 19. Malware locks files for money
  11. 20. Network security barrier
Down
  1. 1. Facial recognition to grant access
  2. 3. Hidden entry for unauthorized access
  3. 6. List of blocked entities
  4. 7. Network of infected computers
  5. 8. Converting ciphertext into plaintext
  6. 13. Machine learning and thinking
  7. 14. Verifying user identity
  8. 15. Scam emails that trick users
  9. 18. Software displaying unwanted ads