Cybersecurity Crossword

123456789101112
Across
  1. 3. A malicious software program designed to replicate itself and spread to other system.
  2. 4. Malicious software designed to secretly monitor and collect user information
  3. 6. A security system designed to monitor, filter, and control network traffic to protect a computer or network
  4. 8. The process of verifying the identity of a user
  5. 10. A method for gaining unauthorized access or control
  6. 11. A secret string of characters used to authenticate a user's identity and grant access to secured systems
  7. 12. The use of digital platforms, such as social media or messaging services, to harass, threaten, or intimidate individuals
Down
  1. 1. An individual or entity that engages in harmful, malicious, or unethical behavior.
  2. 2. A manipulation technique used to deceive individuals into divulging confidential information or performing actions that compromise security
  3. 5. A type of phishing attack that specifically targets high-level executives or senior officials
  4. 7. A form of social engineering to deceive individuals
  5. 9. A program designed to detect, prevent, and remove malicious software, such as viruses, worms
  6. 11. The right or condition of being free from unauthorized observation or intrusion