Cyber Security Awareness Month

123456789101112131415
Across
  1. 3. An attempt to gain unauthorized access to data or systems.
  2. 4. A device used to intercept and record network traffic.
  3. 5. Secret combination used to secure your online accounts.
  4. 7. A secret key generated from cryptographic processes for authentication.
  5. 8. Software that protects a computer from unauthorized access via the internet.
  6. 9. An attack that overloads a system to prevent legitimate access.
  7. 11. A cyber-attack where a user is tricked into giving sensitive information.
  8. 14. The process of verifying your identity before accessing an account.
  9. 15. This security practice hides data so only authorized parties can read it.
Down
  1. 1. The process of making a network secure from unauthorized access.
  2. 2. Type of malware that demands payment to release control of your device.
  3. 6. The act of guessing someone’s password by trying common words.
  4. 10. Unwanted or junk email often containing phishing links.
  5. 12. Network of infected computers controlled by an attacker.
  6. 13. An individual who uses their skills to protect networks.