Cybersecurity Awareness

123456789101112131415161718
Across
  1. 3. Method of secure communication (12 letters).
  2. 8. Malware that demands payment to restore access (10 letters).
  3. 11. Software that collects information without consent (7 letters).
  4. 13. A group of interconnected devices (7 letters).
  5. 14. A potential danger or risk (6 letters).
  6. 15. Software that can infect your computer. (5 letters).
  7. 16. Information stored on a computer (4 letters).
  8. 18. Unauthorized access to a computer system (7 letters).
Down
  1. 1. Process of converting data into a code (11 letters).
  2. 2. A fraudulent scheme to deceive people (4 letters).
  3. 4. The practice of using two different authentication methods (10 letters).
  4. 5. A person who creates software.
  5. 6. Weakness in a system that can be exploited (13 letters).
  6. 7. Measures taken to protect against cyber threats (8 letters).
  7. 9. A person interacting with a computer system (4 letters).
  8. 10. A network security software. (8 letters).
  9. 12. A common email-based attack (8 letters).
  10. 17. Software to protect against malware (9 letters).