Practice Cybersecurity Terminology Puzzle

1234567891011121314151617181920
Across
  1. 4. Data hostage for ransom
  2. 7. Protection of networks from threats
  3. 8. Update that fixes vulnerabilities
  4. 13. Requires multiple identity proofs
  5. 14. Information about cyber threats
  6. 15. Malicious software that harms systems
  7. 18. Encoding sensitive information
  8. 19. Impersonation to obtain information
Down
  1. 1. Vulnerability with no available patch
  2. 2. Weakness in a system
  3. 3. Distributed denial-of-service attack
  4. 5. Verifying user identity
  5. 6. Converting data into codes
  6. 9. Longterm targeted cyberattack
  7. 10. Secure internet connection
  8. 11. Unauthorized access to systems
  9. 12. Blocks unwanted traffic
  10. 16. Software that detects malware
  11. 17. Software that secretly monitors
  12. 20. Continuous cybersecurity monitoring