CYBER SECURITY-CROSSWORD PUZZLE

123456789101112131415
Across
  1. 1. Self Replicating malicious software
  2. 5. Ignoring the request
  3. 6. Too many mails at a time
  4. 9. The potential for negative consequences
  5. 10. A piece of code, or method that leverages a vulnerability) in H/W or S/W to gain unauthorized access or steal data.
  6. 11. An attacker capturing and inspecting data packets as they travel across a network to steal sensitive information
  7. 12. a criminal uses pre-compiled list of common words
  8. 13. cybercriminal impersonates a trusted entity
  9. 15. A broker who misuses data
Down
  1. 1. Destroy the data or assets
  2. 2. A malicious activity that seeks to damage/steal/gain unauthorized access to data
  3. 3. Use people skills to steal information
  4. 4. Weakness or security gaps in a system
  5. 7. Attract you will some benefit for their benefit
  6. 8. keep it as a secret
  7. 14. known as a wordlist, to guess a user's password for a website or system.