Crossword Puzzle on Cybersecurity

1234567891011121314151617
Across
  1. 5. Umbrella term for malicious software.
  2. 8. Code or technique used to take advantage of a vulnerability.
  3. 10. Fraudulent attempt to obtain sensitive information through deception.
  4. 11. Malicious program that records keystrokes.
  5. 12. Unknown vulnerability with no available patch.
  6. 13. Security technique that executes programs in an isolated environment.
  7. 14. Process of verifying a user's identity.
  8. 15. One-way process used to securely store passwords.
  9. 16. A weakness that can be exploited by an attacker.
  10. 17. Harmful component delivered by malware.
Down
  1. 1. Security device that filters network traffic based on rules.
  2. 2. Technique used to protect data by converting it into unreadable form.
  3. 3. Malware designed to hide itself and maintain privileged access.
  4. 4. Malware that encrypts files and demands payment.
  5. 6. Group of compromised systems controlled remotely.
  6. 7. Defines what an authenticated user is allowed to do.
  7. 9. Unauthorized attempt to access a system.