Practice Cybersecurity Terminology Puzzle

123456789101112131415161718
Across
  1. 3. Software to remove malware
  2. 6. Fraud started with phone freaking
  3. 8. Any harmful hacking techniques
  4. 10. Malicious software
  5. 11. An unintended problem with electronics
  6. 12. Access using tor browser
  7. 14. Deliberate theft of sensitive data
  8. 15. Taking advantage of a vulnerability
  9. 17. Performs tasks to solve problems
  10. 18. A barrier between networks
Down
  1. 1. A weakness or flaw
  2. 2. Manages computers recourses and processes
  3. 4. Online harassment
  4. 5. String of octets under 256
  5. 7. Unauthorized access to sensitive data
  6. 9. Malicious program that infects computers
  7. 11. Used to block specific users
  8. 12. Maintenance of data quality
  9. 13. A type of malware
  10. 16. Recently discovered exploits