Cyber Security Puzzle

1234567891011121314151617181920
Across
  1. 2. Process of protecting data by secret code
  2. 3. When a criminal uses text messages to trick you
  3. 6. A sickness in your system
  4. 7. The potential for losing valuable information
  5. 10. A system that prevents unauthorized access
  6. 11. A program that hides functions that are potentially malicious
  7. 12. A software program that enters a computer system without the owner's knowledge or consent
  8. 15. A routine fix for a computer program
  9. 16. Device used to identify a human person entering data
  10. 18. What you should do if you see any anomaly
  11. 19. Unauthorized user with malicious intent
  12. 20. A self-replicating malicious program
Down
  1. 1. Your password is like a ___, use it regularly, change it often and do not share it with anyone else
  2. 2. No reputable organization is going to ask you for private information via
  3. 4. To pose or pretend to be another person in email
  4. 5. Human characteristics used for identification
  5. 7. A criminal tool used for extortion
  6. 8. Vast underbelly of the internet
  7. 9. A small computer defect
  8. 13. Phishing for the big prize!
  9. 14. Don't ___ any file you weren't expecting to receive
  10. 17. If there is not a padlock icon in the search bar the website may be ___