Naomi Cybsercurity Crossword Puzzle

123456789101112131415
Across
  1. 3. a secured connection that can allow remote access to a corporate network.
  2. 6. secretly collects information from a victim’s device, such as user login credentials and system information.
  3. 7. is a form designed to encrypt files on device, rendering any files and the systems that rely on them unusable.
  4. 11. mainly used to prevent specific IP addresses, email addresses, or other identifiers from accessing a system or service.
  5. 13. conceals its true content to fool a user into thinking it’s a harmless file.
  6. 14. a technique for attempting to acquire sensitive data.
  7. 15. operates and maintains the infrastructure that connects online users to the internet.
Down
  1. 1. the conversion of data from a readable format into an encoded format.
  2. 2. an attack that tricks users into thinking they’re clicking on one thing when it’s the complete opposite.
  3. 4. originates from more than one source.
  4. 5. a device that has a network protection application installed to safeguard the network from intentional or unintentional intrusion.
  5. 8. the process of verifying the identity of a user, process, or device.
  6. 9. self-replication, often distributes copies of iself.
  7. 10. combining unique skills with activism, often targeting organizations, governments, or even criminal groups to protest actions or expose personal information.
  8. 12. a program designed to record which keys are pressed on a computer keyboard use to obtain passwords.