CyberSecuriCrazy!

12345678910111213141516171819
Across
  1. 5. A weakness in a system.
  2. 7. Malware that encrypts victim's files.
  3. 10. A fake email scam.
  4. 13. Information used in cyber threats.
  5. 15. A secret word.
  6. 16. Disguised software to trick users.
  7. 17. A network of compromised computers.
  8. 18. Converting data into a secret code.
Down
  1. 1. Security risk posed by employees.
  2. 2. Unauthorized access to computer systems.
  3. 3. Data is accessed or stolen.
  4. 4. Controls incoming and outgoing traffic.
  5. 6. Pretend trusted entity.
  6. 8. Detects and removes viruses.
  7. 9. Verifying a user's identity.
  8. 11. Fixing update in software.
  9. 12. Unknown, exploited software vulnerability.
  10. 14. Attack that overwhelms a system.
  11. 19. Requires two forms of verification.