Cybersecurity Terms

123456789101112131415161718192021
Across
  1. 4. Collection of computers running malicious programs
  2. 8. Virtual perimeter around network
  3. 9. AI-generated video and audio used to deceive
  4. 12. Type of data identifying an individual
  5. 13. Common type of fraud used to social engineer
  6. 14. Everyday objects connected to the web
  7. 16. Malicious software used to obtain money from victims
  8. 18. Type of spyware that records what you type
  9. 20. Electronic money
Down
  1. 1. The use of messaging to harass someone
  2. 2. Weaknesses in software
  3. 3. Used to verify if you're a human or a robot
  4. 5. Simulated network resources designed to entice
  5. 6. Playbook for emergencies
  6. 7. Quick-repair job
  7. 10. Physical devices that connect to a network
  8. 11. Malicious program built for infection
  9. 13. The practice of challenging security systems to discover vulnerabilities
  10. 15. Coolest people on the planet
  11. 17. Least cool people on the planet
  12. 19. Process of verifying identity
  13. 21. Sets of login data used to verify identity