Cybersecurity

123456789101112131415161718
Across
  1. 1. Secure network connection.
  2. 2. Email scam tactic.
  3. 4. Self-replicating malware.
  4. 9. engineering Manipulating people for data.
  5. 10. Unauthorized access attempt.
  6. 12. Stealth force: Password cracking method.
  7. 13. Data encryption for ransom.
  8. 14. Network security barrier.
  9. 16. Faking identity or data.
  10. 18. Malicious program disguised as useful.
Down
  1. 1. Weakness in security.
  2. 3. Data protection method.
  3. 5. Harmful software.
  4. 6. Denial-of-Service attack.
  5. 7. Unique physical traits.
  6. 8. Authentication method.
  7. 11. Secure website protocol.
  8. 15. Computer protection software.
  9. 17. Software update for security.