Cybersecurity Crossword

1234567891011121314151617181920
Across
  1. 2. The process of returning data to its original condition after loss or damage.
  2. 4. A network of private computers infected with malicious software and controlled as a group.
  3. 6. Malicious software that misleads users of its true intent.
  4. 7. A secret word or phrase used to gain access to a system.
  5. 9. Abbreviation for a service that encrypts your internet connection for privacy.
  6. 12. The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  7. 13. A network security system that monitors and controls incoming and outgoing network traffic.
  8. 15. An incident where data is accessed without authorization.
  9. 18. Malware that threatens to publish the victim's data or block access unless a ransom is paid.
  10. 20. Software that enables a user to obtain covert information about another's computer activities.
Down
  1. 1. The process of verifying the identity of a user or process.
  2. 3. A malicious program that replicates itself and spreads to other computers.
  3. 5. The process of converting information into code to prevent unauthorized access.
  4. 8. Software designed to detect and destroy computer viruses.
  5. 10. Software that automatically displays or downloads advertising material.
  6. 11. Software designed to disrupt, damage, or gain unauthorized access to a computer system.
  7. 14. Irrelevant or unsolicited messages sent over the internet.
  8. 16. A copy of data stored separately for recovery in case the original is lost or damaged.
  9. 17. A program that records every keystroke made by a user.
  10. 19. Abbreviation for a protocol for establishing authenticated and encrypted links between networked computers.