Cybersecurity Awareness Month

12345678910111213141516171819202122
Across
  1. 3. A type of malware that denies a user's access to a system or data until a sum of money is paid
  2. 4. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data
  3. 6. Unsolicited emails sent to many addresses
  4. 7. Computer programs that can block, detect, and remove viruses and other malware
  5. 8. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information
  6. 9. A collection of computers compromised by malicious code and controlled across a network
  7. 10. A string of characters used to authenticate an identity
  8. 12. A mechanism for creating a secure connection between a computing device and a computer network
  9. 14. Software the compromises the operation of a system by performing an unauthorized function or process
  10. 15. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like they are from a trusted source
  11. 18. the ability of individuals to understand and exercise control over how information about themselves may be used by others
  12. 19. A cybersecurity risk that originates from within an organization
  13. 21. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  14. 22. An unauthorized user who attempts to or gains access to an information system
Down
  1. 1. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's device
  2. 2. Extra copies of computer files that can be used to restore files that are lost or damaged
  3. 5. Software designed to black malware from entering protected networks
  4. 6. Software that is secretly installed into an information system without the knowledge of the system user or owner
  5. 7. A process or measure used to verify a user's identity
  6. 11. Faking the sending address of a transmission to gain illegal entry into a secure system
  7. 13. A flaw or weakness in an information system that could be exploited
  8. 16. Converting data into a form that cannot be easily understood by unauthorized people
  9. 17. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
  10. 20. Part of the internet that isn't indexed by search engines