Cybersecurity

123456789101112131415161718
Across
  1. 2. Network security barrier.
  2. 4. Weakness in security.
  3. 6. Data protection method.
  4. 8. Malicious program disguised as useful.
  5. 9. Faking identity or data.
  6. 11. Secure website protocol.
  7. 14. Self-replicating malware.
  8. 16. Unauthorized access attempt.
  9. 17. Software update for security.
  10. 18. Harmful software.
Down
  1. 1. Authentication method.
  2. 3. Stealth force: Password cracking method.
  3. 4. Secure network connection.
  4. 5. Unique physical traits.
  5. 7. Data encryption for ransom.
  6. 10. Email scam tactic.
  7. 12. Computer protection software.
  8. 13. Denial-of-Service attack.
  9. 15. engineering Manipulating people for data.