Cyber Security Terms

12345678910111213141516171819202122
Across
  1. 3. Software designed to harm systems.
  2. 4. Permission to use a system.
  3. 9. Copy of data for recovery.
  4. 12. Device connected to a network.
  5. 14. Software to detect and remove malware.
  6. 16. Holds data hostage for payment.
  7. 18. Malicious software disguised as useful.
  8. 20. engineering, Manipulating people for information.
  9. 21. Converts data into fixed-size output.
  10. 22. Self-replicating malware that spreads.
Down
  1. 1. Hiding data within other data.
  2. 2. Period of active user interaction
  3. 4. Verifying user identity.
  4. 5. Software fix for vulnerabilities.
  5. 6. Remote storage and computing service.
  6. 7. Weakness in a system's security.
  7. 8. Software that displays unwanted ads.
  8. 10. Prevents unauthorized network access.
  9. 11. Self-replicating code that harms systems.
  10. 13. Deceptive emails to steal information.
  11. 15. Web address used for navigation.
  12. 17. Secret phrase for user authentication.
  13. 19. Unauthorized access to data.