Cybersecurity Awareness Month

12345678910111213141516
Across
  1. 4. A secret word or phrase used to authenticate access
  2. 7. Verifying the identity of a user or device
  3. 9. The malicious part of malware delivered after exploitation
  4. 10. Malicious act of publicly releasing personal information online
  5. 12. Secures information using mathematical algorithms
  6. 14. Any software intentionally designed to cause damage or unauthorized access
  7. 15. Deceptive attempt to steal sensitive information
  8. 16. A network of compromised devices controlled by an attacker
Down
  1. 1. One-way transformation of data into a fixed-length string
  2. 2. Network device or software that filters traffic
  3. 3. Malicious program that can replicate and spread
  4. 5. A potential danger to cybersecurity
  5. 6. The practice of disguising communication to appear as a trusted entity
  6. 8. Takes advantage of a software vulnerability
  7. 11. An incident where data is accessed or disclosed without authorization
  8. 13. Secret method to bypass security controls