Cybersecurity Awareness Month

1234567891011121314
Across
  1. 2. Common type of cyberattack where the hacker encrypts your files and demands payment.
  2. 5. A ____ test is performed to identify vulnerabilities in a system.
  3. 7. This form of attack tries to trick you into giving personal information via fake websites or emails.
  4. 8. A phishing attack done over the phone.
  5. 13. The process of verifying someone's identity.
  6. 14. A strong, complex one helps protect your accounts.
Down
  1. 1. A person who attempts to gain unauthorized access to your system.
  2. 3. A type of phishing attack done over text messages.
  3. 4. A software that fights off malicious viruses and malware.
  4. 6. The backbone of secure communication online, abbreviated as SSL.
  5. 9. Protection against unauthorized changes to data.
  6. 10. Multi-Factor Authentication is shortened to this.
  7. 11. A harmful program disguised as legitimate software.
  8. 12. A malicious code that spreads from computer to computer.