Cyber Defence

1234567891011121314151617
Across
  1. 4. Software designed to detect and remove threats
  2. 6. Person who gains unauthorized access to systems
  3. 7. Network barrier that filters traffic
  4. 10. Software that secretly monitors users
  5. 13. Process of turning encoded data back to normal
  6. 15. Network of compromised devices controlled remotely
  7. 17. Malware that locks files until payment is made
Down
  1. 1. Method of protecting data by encoding it
  2. 2. Copy of data for recovery
  3. 3. Authentication using fingerprints or face
  4. 5. Fake messages used to steal information
  5. 8. Temporary code used for authentication
  6. 9. Security using multiple verification methods
  7. 11. Update that fixes vulnerabilities
  8. 12. Tool used to hide malicious activity
  9. 14. Employee who misuses access to data
  10. 16. Secure connection over the internet