Cyber Security Month Crossword Puzzle

1234567891011121314151617
Across
  1. 5. A type of malware that disguises itself as legitimate software (6 letters)
  2. 7. Software designed to disrupt, damage, or gain unauthorized access (7 letters)
  3. 9. To bring software up to date with the latest patches or fixes (6 letters)
  4. 12. Software that secretly monitors user activity (7 letters)
  5. 14. A security system that controls incoming and outgoing network traffic (7 letters)
  6. 15. A fraudulent attempt to obtain sensitive information (8 letters)
  7. 16. Software designed to detect and destroy viruses (9 letters)
Down
  1. 1. Malware that encrypts files and demands payment for decryption (10 letters)
  2. 2. Information used to verify a user's identity (11 letters)
  3. 3. A copy of data stored separately to prevent loss (6 letters)
  4. 4. Unauthorized access to data or systems (6 letters)
  5. 6. A secret word or phrase used for authentication (8 letters)
  6. 8. The process of converting information or data into a secure format (10 letters)
  7. 10. A fraudulent attempt to obtain sensitive information (8 letters)
  8. 11. Impersonating a legitimate source to gain unauthorized access (7 letters)
  9. 13. An individual who uses technical skills to gain unauthorized access (6 letters)
  10. 17. A tool used to secure and anonymize internet connections (3 letters)