Cybersecurity XC 101

1234567891011121314151617181920
Across
  1. 5. a barrier between a trusted network and an untrustworthy network.
  2. 8. tries to access data they aren’t authorized to view.
  3. 9. a form of malware. It is designed to block users from accessing a computer system until a sum of money has been paid.
  4. 12. a physical device connected to a computer network.
  5. 13. converting information into a code to prevent unauthorized access.
  6. 14. process for telling a computer which tasks to perform in order to solve problems.
  7. 18. cybercriminals disguise their identity as a trusted source to exploit an unassuming user.
  8. 20. anti-malware
Down
  1. 1. weak point or flaw
  2. 2. short for malicious software
  3. 3. converting coded or encrypted data to its original form.
  4. 4. a form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
  5. 6. converting plain data into an encrypted format.
  6. 7. network of private computers infected with malicious software.
  7. 10. attempts by hackers to cause harm, destroy, or access sensitive information.
  8. 11. unintended software or hardware problem
  9. 15. a set of software tools that give users access to another machine without being detected.
  10. 16. a group of connected computers
  11. 17. infects computers
  12. 19. serve as the entry and exit points for all data.