CYBERSECURITY

123456789101112
Across
  1. 1. the abuse of email to send unsolicited bulk messages
  2. 5. information
  3. 6. capability to limit network traffic between networks
  4. 8. a person who breaks into a computer or network
  5. 9. a string of characters used to verify access authorization
  6. 11. the process of transforming plaintext into cipher text
  7. 12. software that compromises the operation of a system
Down
  1. 2. measures to reduce the likelihood of an unwanted occurence
  2. 3. a program that can infect a computer and spread to another computer
  3. 4. software that tracks keystrokes and keyboard events
  4. 7. self replicating program that uses networking mechanisms to spread itself
  5. 10. software that is secretly installed into a system