cyber security

123456789101112131415
Across
  1. 2. A type of malware that disguises itself as legitimate software
  2. 5. Maintaining the accuracy and trustworthiness of data
  3. 7. The act of tricking people into revealing sensitive information
  4. 8. A security process requiring a username and password
  5. 10. A method used to convert readable data into unreadable code
  6. 11. A type of malware that demands payment to restore access to files
  7. 12. Malicious software that replicates itself to spread to other computers
  8. 14. Ensuring that data and services are accessible when needed
  9. 15. A type of cyber attack that overwhelms a server with traffic
Down
  1. 1. The practice of ensuring data is only accessed by authorized users
  2. 3. A process that transforms plaintext into unreadable text
  3. 4. A program designed to protect your device from viruses
  4. 6. A network security system that monitors and controls incoming and outgoing traffic
  5. 7. A secret code used for authentication
  6. 9. Unsolicited and unwanted bulk emails
  7. 13. A person who gains unauthorized access to a system