Cybersecurity

123456789101112131415161718
Across
  1. 6. Multiple compromised computers
  2. 7. Trial and error password guessing
  3. 9. Layered security system
  4. 12. Malware locked by bribe
  5. 13. Copy of computer data
  6. 14. Junk emails or posts
  7. 15. Character sequence used for access
  8. 18. Electronic inventory of someones network
Down
  1. 1. Identity verification
  2. 2. Private and secure network
  3. 3. Software created to disrupt
  4. 4. Recording keystrokes in real time
  5. 5. Tracking user on a server
  6. 8. Identifying entities on the internet
  7. 10. File link to another location
  8. 11. Protection through scrambled data
  9. 13. Locate/display information on servers
  10. 14. Malware that monitors and reports
  11. 16. Pretending to gain trust
  12. 17. Searching or screening data