Cybersecurity

1234567891011121314151617181920
Across
  1. 2. Software that secretly collects user information
  2. 6. Verifying the identity of a user or device
  3. 7. A small file stored on your device by websites you visit
  4. 10. A type of malware that replicates and spreads to other programs
  5. 11. A secret string of characters used to access a system
  6. 12. A person who gains unauthorized access to systems
  7. 14. A type of scam where attackers trick users into revealing information
  8. 17. A type of malware disguised as legitimate software
  9. 18. Software designed to detect and remove malicious programs
  10. 20. A program that records keystrokes to steal data
Down
  1. 1. A security process requiring two different authentication methods
  2. 3. A software update that fixes security vulnerabilities
  3. 4. ENGINEERING Manipulating people into revealing confidential information
  4. 5. Software designed to harm or exploit any device or network
  5. 8. The process of converting data into a coded form
  6. 9. An incident where data is accessed without authorization
  7. 13. A network security system that monitors and controls traffic
  8. 15. A copy of data stored to prevent loss
  9. 16. A network of infected computers under a hacker’s control
  10. 19. A secure connection over the internet to protect data