InfoSec Awareness Crossword Puzzle

12345678910111213
Across
  1. 1. Protocol that is meant for uploading and downloading files.
  2. 5. Part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
  3. 7. Any malicious software that encrypts data found on an individual’s or enterprise system, then demands a huge amount of money for recovery
  4. 8. The intentional or unintentional release of secure or private/confidential information to an untrusted environment.
  5. 10. A form of cryptographic security method that is used to transform strings of characters in shorter fixed-length value that poses as the original string.
  6. 11. The act of using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft.
  7. 12. A computer program that keeps a log of your keystrokes on your keyboard.
  8. 13. A cybercrime in which a target or targets are contacted by someone posing as a legitimate institution to lure individuals into providing sensitive data.
Down
  1. 2. a cyber attack intended to redirect a website's traffic to another, fake site.
  2. 3. A bundle of programs that is designed to bombard users with advertisements.
  3. 4. The process by which two information systems establish a communication channel.
  4. 6. A malicious program that acts as a backdoor for an attacker allowing hime control of the hosts system
  5. 8. A bunch of several Internet-connected devices that is infectious and controlled by a specific type of malware.
  6. 9. A virtual barrier that protects both internal and external cyber-attacks that might attack your personal computer.