Cybersecurity Terms

12345678910111213141516171819
Across
  1. 3. Covert method of bypassing normal authentication.
  2. 4. Denial of service attack affecting one system.
  3. 5. Unsolicited Emails.
  4. 8. Response test to verify human v. bot.
  5. 9. Secretly installed data gathering software.
  6. 12. Group of Compromised Internet-connected devices.
  7. 15. Network protection preventing virus from penetrating.
  8. 17. Digital form of social engineering using deceit.
  9. 18. A fundamental unit of computer storage
  10. 19. Software that monitors for Malware.
Down
  1. 1. Software designed to harm or exploit.
  2. 2. Malware preventing file access via Encryption.
  3. 6. Encrypted sites not indexed by search engines.
  4. 7. Spyware that records keystrokes.
  5. 10. Successful hack allows access to files.
  6. 11. Capturing of Data Packets over network.
  7. 13. Vulnerability or flaw in a system.
  8. 14. Denial of service attack affecting multiple systems.
  9. 16. Attackers posing as a known trusted source.
  10. 19. Software that earns revenue off advertisements