Cybersecurity and Cryptography

123456789101112131415
Across
  1. 2. What is a digital document that verifies the ownership of a public key?
  2. 3. What type of malware records keystrokes made by a user?
  3. 5. What term refers to the permission to enter or use a system or network?
  4. 6. What term refers to malicious software designed to harm or exploit devices?
  5. 8. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  6. 9. term describes a weakness in a system that can be exploited by threats?
  7. 14. What is the process of verifying the identity of a user or system?
  8. 15. What is the process of converting data into a fixed-size string of characters for security?
Down
  1. 1. What device monitors and controls incoming and outgoing network traffic?
  2. 4. What is the process of converting ciphertext back into plaintext?
  3. 7. What protocol secures data sent over the internet by encrypting it?
  4. 10. What is the process of converting plaintext into ciphertext to protect information?
  5. 11. What is the process of creating copies of data to restore in case of loss?
  6. 12. What is a physical or digital object used to prove identity in security systems?
  7. 13. What type of malware disguises itself as legitimate software?