Cyber Awareness

1234567891011
Across
  1. 2. Attack that overwhelms a system with massive fake traffic.
  2. 5. General term for malicious software.
  3. 6. Login method requiring two forms of authentication.
  4. 7. An update that fixes security vulnerabilities in software.
  5. 8. Network security system that blocks unauthorized access.
  6. 10. Software or hardware that records everything typed.
Down
  1. 1. A network of compromised computers controlled remotely
  2. 3. Unauthorized access to sensitive systems or data.
  3. 4. A vulnerability that hackers exploit before it’s patched.
  4. 7. A fake email scam designed to steal personal information.
  5. 9. Self-replicating program that spreads without human help.
  6. 11. Malware that locks files and demands payment.