Cyber security

1234567891011121314151617181920
Across
  1. 1. | Abbreviation for Virtual Private Network, used for secure internet connections.
  2. 3. | Software that secretly monitors user activity.
  3. 8. | Faking the sending address of an email to trick recipients.
  4. 9. | Copy of data stored separately for recovery in case of loss.
  5. 11. | Malicious tool that records keystrokes.
  6. 13. | Unwanted or unsolicited emails.
  7. 14. | Process of converting information into code to prevent unauthorized access.
  8. 17. | Two-factor authentication, adds extra security to logins.
  9. 18. | Software designed to damage or gain unauthorized access to a system.
  10. 19. | Malicious program that spreads itself to other computers.
Down
  1. 2. | Fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
  2. 4. | Program that detects and removes malicious software.
  3. 5. | Small data stored on a user’s browser to track activity.
  4. 6. | Security system that controls incoming and outgoing network traffic.
  5. 7. | A secret word or phrase for authentication.
  6. 10. | Network of infected computers controlled by a hacker.
  7. 12. | Malicious software that blocks access to data until a payment is made.
  8. 15. | Malicious program disguised as legitimate software.
  9. 16. | A person who gains unauthorized access to data.
  10. 20. | Multi-factor authentication for added account protection.