Practice Cybersecurity Terminology Puzzle
Across
- 3. Software to remove malware
- 6. Fraud started with phone freaking
- 8. Any harmful hacking techniques
- 10. Malicious software
- 11. An unintended problem with electronics
- 12. Access using tor browser
- 14. Deliberate theft of sensitive data
- 15. Taking advantage of a vulnerability
- 17. Performs tasks to solve problems
- 18. A barrier between networks
Down
- 1. A weakness or flaw
- 2. Manages computers recourses and processes
- 4. Online harassment
- 5. String of octets under 256
- 7. Unauthorized access to sensitive data
- 9. Malicious program that infects computers
- 11. Used to block specific users
- 12. Maintenance of data quality
- 13. A type of malware
- 16. Recently discovered exploits