Cybersecurity Awareness Crossword Puzzle Week 2

12345678910111213
Across
  1. 3. A bot-challenging security feature for online interactions.
  2. 4. Code to fix or enhance software.
  3. 6. Captures keystrokes to gather sensitive information.
  4. 8. Security solution to analyze and detect threats in real-time from diverse data and events.
  5. 9. Collaboration integrating security, automation, and shared responsibility in software development.
  6. 10. Harmful software for gathering information without consent.
  7. 12. A stealthy malware granting unauthorized system access while concealing actions.
  8. 13. Network of devices used for malware distribution, and cyber-attacks.
Down
  1. 1. Email attachments from unknown senders.
  2. 2. A way to bypass authentication, used for unauthorized access or malicious intent.
  3. 5. The most common word used for brute force.
  4. 7. Safeguard sensitive files and communications.
  5. 8. Isolated environment to analyze software behavior.
  6. 11. A U.S. federal agency promoting cybersecurity standards and innovation.