Cybersecurity Terms Crossword Puzzle

12345678910111213141516171819
Across
  1. 4. Secure connection for private browsing
  2. 7. Hostage-taking malware for files
  3. 9. Vulnerability before the fix
  4. 10. Identity verification for access
  5. 11. Computer virus and harmful software
  6. 13. Guard against harmful computer viruses
  7. 15. Protecting digital systems and data
  8. 18. Monitor for malicious activities
  9. 19. Deceptive emails for sensitive data
Down
  1. 1. Deliberate act to disrupt systems
  2. 2. Malicious software's harmful action
  3. 3. Secretly records keystrokes for theft
  4. 4. System's exploitable weak point
  5. 5. Network traffic gatekeeper and monitor
  6. 6. Secret entry to bypass security
  7. 8. Impersonation for unauthorized access
  8. 12. Secure data with secret code
  9. 14. Authorized entities' access list
  10. 16. Flood of traffic to disrupt
  11. 17. Software update to fix vulnerabilities