25 key words that represent Cybersecurity

12345678910111213141516171819202122232425
Across
  1. 3. Any technology, be it software or hardware, used to keep intruders out.
  2. 4. Software package that performs a specific function directly for a person who is intended to use a computer system.
  3. 8. A piece of audio or video that has been altered and changed to make it seem authentic or credible
  4. 10. A scam where a hacker poses as a legitimate business or organization
  5. 11. Using multiple hosts and users, hackers bombard a website with a tidal wave of requests
  6. 12. A set of instructions, or a system of rules, written in a particular programming language
  7. 14. A computer program that can copy itself and infect a computer without permission
  8. 16. A mode in the computer that stores data on servers in different locations
  9. 18. Two or more computers connected together to share resources
  10. 20. A method of connecting a series of computers and devices in a private encrypted network,
  11. 22. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network
  12. 23. A form of malware that hijacks your system and encrypts your files
  13. 24. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches
  14. 25. While someone is tricked into clicking on one object on a web page when they want to click on another,
Down
  1. 1. A means of attack on a computer system
  2. 2. A technique to prevent unauthorized users from accessing sensitive data
  3. 5. Smallest unit of a digital image
  4. 6. A set of rules governing the format of data sent via the internet or local network.
  5. 7. The capacity a network can transfer data
  6. 9. Allows devices to communicate with each other
  7. 13. Coding used to protect your information from hackers.
  8. 15. The result of a hacker successfully breaking into a system
  9. 17. A form of malware used by hackers to spy on you and your computer activities.
  10. 19. Any attempt to breach a logical environment's security boundary
  11. 21. a misleading computer program that looks innocent, but in fact allows the hacker into your system