Jacob’s cybersecurity crossword

123456789101112131415
Across
  1. 3. A program that appears harmless but contains malicious code to give a hacker access.
  2. 5. A network of private computers infected with malicious software and controlled as a group.
  3. 6. Malware that locks or encrypts your files and demands payment to get them back.
  4. 8. A security system that monitors and controls incoming and outgoing network traffic.
  5. 9. The trail of data you leave behind while using the internet.
  6. 13. The process of verifying the identity of a user or process.
  7. 14. Short for "malicious software," designed to damage or gain unauthorized access to a computer.
  8. 15. A piece of code that can copy itself and typically has a detrimental effect, such as corrupting the system.
Down
  1. 1. A weakness in a computer system that could be exploited by a cyberattack.
  2. 2. The process of converting information into a secret code to prevent unauthorized access.
  3. 4. Using human interaction to manipulate people into breaking normal security procedures.
  4. 7. The correct or acceptable way of communicating on the internet.
  5. 10. A security process that requires two different forms of identification to access an account.
  6. 11. Software that secretly records what you do on your computer, like capturing your keystrokes.
  7. 12. A deceptive email or message designed to trick you into revealing personal information.