Cybersecurity

123456789101112
Across
  1. 2. Irrelevant or inappropriate messages sent on the internet.
  2. 4. Designed to disrupt, damage, or gain access to a computer.
  3. 6. Data storage device that includes flash memory. (Contains 2 words for example: Deep fake becomes Deepfake).
  4. 8. Is a vulnerability in a system or device that has been disclosed but is not yet patched.
  5. 10. Sending emails to induce individuals to reveal personal information.
  6. 11. Process of encoding a message or information that only authorized parties can access. (Contains 2 words for example: USB Drive becomes USBDrive).
  7. 12. Allows users and websites operator to remain anonymous.
Down
  1. 1. Software designed to block access to a computer system until money is paid.
  2. 3. Access to a centralized resource or service.
  3. 5. Computer program that records every keystroke.
  4. 6. A standard cable connection interface for personal computers.
  5. 7. Web World wide web that is not discoverable. (Contains 2 words for example: USB Drive becomes USBDrive.
  6. 9. A video or sound recording that replaces someone's face or voice with someone else's, in a way that looks real.(Contains 2 words for example: USB Drive becomes USBDrive).