cybersecurity

123456789101112131415161718192021
Across
  1. 2. | Network of infected computers controlled by a hacker
  2. 4. | Security risk originating from within an organization
  3. 8. | Secret string of characters used to access an account
  4. 12. | Unwanted or unsolicited digital messages
  5. 13. | Malicious program that replicates and spreads between computers
  6. 14. | Person who gains unauthorized access to computer systems
  7. 17. | Process of converting data into a secure coded form
  8. 18. | Practice of protecting systems, networks, and data from attacks
  9. 20. | Malware that locks data and demands payment for its release
  10. 21. | Faking identity or source of communication to trick systems or users
Down
  1. 1. | Weakness in a system that can be exploited by attackers
  2. 3. | Secure connection that encrypts internet traffic over a network
  3. 5. | Hidden part of the internet not indexed by standard search engines
  4. 6. | Software designed to detect and remove malicious programs
  5. 7. | Fraudulent attempt to obtain sensitive information via fake messages
  6. 9. | Process of verifying a user's identity
  7. 10. | Passwordless authentication method using cryptographic keys
  8. 11. | Incident where sensitive information is exposed or stolen
  9. 15. | Software designed to harm or exploit devices or networks
  10. 16. | Security system that monitors and controls network traffic
  11. 19. | Protection of personal and sensitive information