Cyber Basics & Common Threats

1234567891011121314
Across
  1. 3. Software designed to harm or exploit a system
  2. 4. Network of infected computers controlled remotely
  3. 7. Malware that locks data and demands payment
  4. 10. Software that secretly collects user data
  5. 11. Process of converting information into code
  6. 13. Software update to fix vulnerabilities
  7. 14. Malware designed to hide other malicious software
Down
  1. 1. A secret string of characters used for authentication
  2. 2. Self-replicating malicious program
  3. 5. Malicious software disguised as legitimate
  4. 6. A security barrier between trusted and untrusted networks
  5. 8. Taking advantage of a vulnerability
  6. 9. Hidden entry point into a system
  7. 12. Software that detects and removes malicious code
  8. 13. Fraudulent attempt to steal sensitive data via fake email