Cyber Ethics Crossword Assignment 2

1234567891011121314151617181920
Across
  1. 2. Software update designed to fix security flaws
  2. 10. Cyberattack that overwhelms a system with requests
  3. 11. A secret entrance to a system that bypasses security systems
  4. 13. The use of biological identifiers for stronger security
  5. 14. Federal law for prosecuting computer crimes
  6. 15. The use of text messages for phishing
  7. 17. Criminals use the identification of an innocent person to commit crime
  8. 19. Malware that encrypts the files on a computer and demands payment for decryption
Down
  1. 1. Software designed with malicious purposes
  2. 3. Storage medium that uses spinning magnetic disks
  3. 4. Use of cyberattacks for military purposes
  4. 5. Hackers that engage in illegal malicious activities
  5. 6. Fraudulent messages designed to steal information
  6. 7. Software that bridges to computer hardware
  7. 8. Devices that illegally collect credit card information when a card is inserted
  8. 9. A network of hacked computers that carry out coordinated attacks
  9. 12. Suppressing or filtering digital content
  10. 16. Use of hacking for political purposes
  11. 18. Converting readable information into a unreadable format
  12. 20. Hackers that help organizations find flaws in their systems