Cyber Security

1234567891011121314151617181920
Across
  1. 3. Blocks unauthorized network access
  2. 5. Guessing passwords repeatedly
  3. 6. Simulated hacking for security testing
  4. 8. Secret for decrypting data
  5. 9. Overloads a website’s server
  6. 11. Software designed to harm systems
  7. 12. Shared for encrypted messages
  8. 15. Exploit with no known fix
  9. 18. Disguised as harmless software
  10. 19. Code inserted into databases
  11. 20. Encrypts internet traffic for privacy
Down
  1. 1. Locks files, demands payment
  2. 2. Records what you type
  3. 4. Converts data into secret code
  4. 7. Secretly monitors user activity
  5. 10. Tricking people for access
  6. 13. Network of hacked computers
  7. 14. Extra login security step
  8. 16. Scrambles data into fixed code
  9. 17. Fraudulent emails tricking users