Participation | Cybersecurity Crossword Puzzle

123456789101112131415161718
Across
  1. 2. Malware that can reproduce itself
  2. 9. phishing that targets a specific individual
  3. 10. program that is run entirely from the network
  4. 11. encrypted parts of the internet
  5. 13. hacker poses as a legitimate business
  6. 14. attack on a computer system
  7. 15. technology used to keep intruders out
  8. 16. breach hacker successfully breaking into a system
  9. 17. Coding used to protect your information
  10. 18. computer infected with a virus
Down
  1. 1. contains items that are temporarily blocked
  2. 3. capture of data as its being transmitted
  3. 4. process of identifying a user
  4. 5. a private network across a public network
  5. 6. records keystrokes made on a computer
  6. 7. malware that hijacks your system
  7. 8. malware used by hackers to spy on you
  8. 10. tricked into clicking on a object on a web page
  9. 12. hacker changes the IP address of an email
  10. 16. video that has been altered to make it authentic