Cybersecurity

123456789101112131415161718192021
Across
  1. 9. The process of transforming data into a secret code
  2. 10. A weak point in a system that can be exploited
  3. 11. Protects digital data by requiring two forms of authentication
  4. 14. The action of intercepting communication without permission
  5. 15. An encrypted tunnel used for secure internet communication
  6. 16. A deceptive method used to trick systems into executing harmful code
  7. 17. A software update meant to fix bugs or vulnerabilities
  8. 20. The overall practice of protecting networks and systems from digital attacks
  9. 21. A malicious program that replicates itself
Down
  1. 1. The concept of ensuring only authorized users have access to data
  2. 2. Software designed to protect against malware
  3. 3. A method used to guess a password by systematically checking all possibilities
  4. 4. A type of software that monitors and blocks unauthorized network traffic
  5. 5. A program that logs user keystrokes to steal information
  6. 6. Unsolicited or junk email
  7. 7. A small piece of malicious software disguised as legitimate software
  8. 8. A person who tests security systems legally to find vulnerabilities
  9. 12. A database of known vulnerabilities used by security analysts
  10. 13. A type of attack that overwhelms a network with traffic
  11. 15. A tool used to scan for vulnerabilities in a system
  12. 18. A technique used by attackers to trick users into providing sensitive information
  13. 19. The unauthorized access and use of data