Security Terminology Puzzle (Participation 3) - Emily Pedrazzi

1234567891011121314151617181920
Across
  1. 4. Many devices attack a target.
  2. 5. Creates an encrypted tunnel.
  3. 8. Many compromised computers sending cyberattacks.
  4. 10. Detects and protects against malware.
  5. 11. Pay to regain access to systems.
  6. 13. Malicious software.
  7. 14. Tricks users into providing information.
  8. 15. Attack that exploits new vulnerabilities.
  9. 17. Cisco's entry-level network certification.
  10. 18. Someone who exploits vulnerabilities.
  11. 20. Someone who penetration tests organizations.
Down
  1. 1. Scrambles sensitive data; must decrypt.
  2. 2. Saves hardware costs; increases risk.
  3. 3. Legitimate app containing harmful malware.
  4. 6. Free Internet access.
  5. 7. Falsified media used for harm.
  6. 9. Blocks unusual traffic and users.
  7. 12. CompTIA's entry-level security certification.
  8. 16. Sensitive information exposed to attackers.
  9. 19. Requires users to confirm identity.