cyber security puzzle

123456789101112131415161718
Across
  1. 3. A type of malware that locks files and demands payment for access
  2. 4. A network security system that monitors and controls incoming and outgoing traffic
  3. 9. A manipulation technique used to deceive users into giving up confidential data
  4. 10. The process of converting data into a coded format for security
  5. 11. An update designed to fix security vulnerabilities in software
  6. 12. An attack that tricks users into revealing sensitive information
  7. 14. A hidden entry point in software that allows unauthorized access
  8. 15. A cyber attack that overwhelms a network or service with traffic
  9. 17. A tool used to create a secure, encrypted connection over the internet
  10. 18. Malicious software that secretly gathers user information
Down
  1. 1. An attack that tries multiple password combinations until the correct one is found
  2. 2. Malicious software that can damage files or steal information
  3. 5. A method of securing passwords by transforming them into fixed-length values
  4. 6. A security vulnerability that is exploited before a fix is available
  5. 7. Software embedded in hardware that controls device functionality
  6. 8. A security practice of verifying user identity
  7. 11. A secret key used for encrypting and decrypting messages
  8. 13. A type of malware disguised as legitimate software
  9. 14. A network of compromised computers controlled by an attacker
  10. 16. A type of software that records keystrokes to steal passwords