2025 Cybersecurity Awareness Month

123456789101112131415161718192021222324252627282930
Across
  1. 2. Software that displays unwanted advertisements.
  2. 5. A vulnerability unknown to those who should mitigate it.
  3. 7. Network security system that monitors and controls incoming and outgoing traffic.
  4. 10. System that aggregates and analyzes security data.
  5. 11. Software update that fixes vulnerabilities.
  6. 12. Malware disguised as legitimate software.
  7. 13. Symmetric encryption standard used worldwide.
  8. 15. Unauthorized transmission of sensitive information.
  9. 17. Isolated environment for testing suspicious code.
  10. 18. Framework for managing digital identities.
  11. 19. Routine practices to maintain security health.
  12. 20. Simulated attack to evaluate system security.
  13. 22. Security broker between users and cloud services.
  14. 26. Security method requiring multiple forms of verification.
  15. 28. Software that secretly gathers user information.
  16. 29. Protocol for secure communication over networks.
  17. 30. Attack method that tries every possible password combination.
Down
  1. 1. Psychological manipulation to trick users into giving up confidential info.
  2. 3. General term for malicious software.
  3. 4. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  4. 6. Malware that encrypts data and demands payment for its release.
  5. 8. Prolonged and targeted cyberattack.
  6. 9. Creates a secure connection over the internet.
  7. 14. Malware that hides its presence from detection.
  8. 16. Process of converting data into a coded format.
  9. 21. Controls access to privileged accounts.
  10. 23. Network of infected devices controlled remotely.
  11. 24. Malware that replicates itself to spread.
  12. 25. Hidden method of bypassing normal authentication.
  13. 27. Converts data into a fixed-size string.