Across
- 5. A weakness in a system.
- 7. Malware that encrypts victim's files.
- 10. A fake email scam.
- 13. Information used in cyber threats.
- 15. A secret word.
- 16. Disguised software to trick users.
- 17. A network of compromised computers.
- 18. Converting data into a secret code.
Down
- 1. Security risk posed by employees.
- 2. Unauthorized access to computer systems.
- 3. Data is accessed or stolen.
- 4. Controls incoming and outgoing traffic.
- 6. Pretend trusted entity.
- 8. Detects and removes viruses.
- 9. Verifying a user's identity.
- 11. Fixing update in software.
- 12. Unknown, exploited software vulnerability.
- 14. Attack that overwhelms a system.
- 19. Requires two forms of verification.
