CyberNewspaper

1234567891011121314151617181920212223
Across
  1. 2. Online harassment or bullying
  2. 5. Impersonating someone or something to deceive
  3. 6. Software update to fix security vulnerabilities
  4. 9. Measures taken to protect data
  5. 10. Function that converts data into a fixed size
  6. 13. Network of compromised computers under attacker control)
  7. 15. Securing data by converting it into code
  8. 17. Distributed Denial of Service attack to overwhelm a network)
  9. 19. Investment scam involving fake accounts
  10. 20. Self-replicating malware that spreads across networks)
  11. 22. Software that shows unwanted ads
  12. 23. A system that protects networks
Down
  1. 1. Fraudulent attempts to steal sensitive information)
  2. 3. Malware that encrypts files demanding ransom
  3. 4. Zero Trust Architecture
  4. 7. Hidden way of bypassing security controls
  5. 8. Malware disguised as legitimate software
  6. 11. Attack using trial and error to guess passwords)
  7. 12. Software that records keystrokes
  8. 14. Virtual Private Network for secure connections
  9. 16. Vulnerabilities exploited before being patched
  10. 18. Software that collects data secretly
  11. 21. Multi-Factor Authentication