Cyber - Key words

1234567891011121314151617181920
Across
  1. 4. Protects systems by controlling incoming and outgoing network traffic.
  2. 8. Malicious software that blocks access to data until a ransom is paid.
  3. 11. Virtual Private Network, enhances online privacy and security.
  4. 12. Software designed to disrupt, damage, or gain unauthorized access to systems.
  5. 14. Small data stored on a user's computer by a website.
  6. 16. A string of characters used to authenticate access to a system.
  7. 17. Regularly applied software improvements for security and functionality.
  8. 18. An attack that floods a system with traffic to disrupt its normal operations.
  9. 19. Moral principles guiding responsible use of technology.
Down
  1. 1. Fraudulent attempt to obtain sensitive information through deceptive emails.
  2. 2. Information processed or stored by a computer.
  3. 3. A group of interconnected devices sharing resources.
  4. 5. A type of malware disguised as legitimate software.
  5. 6. A barrier to protect a network from unauthorized access.
  6. 7. Software designed to detect and remove malicious programs.
  7. 9. Software that secretly gathers user information without consent.
  8. 10. Unwanted or junk email messages.
  9. 13. The process of converting data into a code to prevent unauthorized access.
  10. 15. A set of rules governing data communication over a network.
  11. 20. A person who exploits weaknesses in computer systems or networks.