Draeko Cybersecurity Crossword

123456789101112131415
Across
  1. 2. A form of malware that encrypts a user’s data and demands payment to unlock it.
  2. 4. Malware that gathers information about a person or organization without their knowledge.
  3. 6. Malware that gathers information about a person or organization without their knowledge.
  4. 10. A network security device or software that monitors and controls incoming and outgoing traffic.
  5. 12. A simulated cyberattack to evaluate the security of a system.
  6. 15. An extra layer of security requiring two forms of identification for access.
Down
  1. 1. The psychological manipulation of people to disclose confidential information.
  2. 3. Software intentionally designed to cause damage, such as viruses, worms, and Trojans.
  3. 5. The process of converting information into a code to prevent unauthorized access.
  4. 7. A type of social engineering attack where attackers trick users into revealing personal information.
  5. 8. A trial-and-error method used to guess passwords or encryption keys.
  6. 9. An attack where multiple systems flood a target, causing denial of service.
  7. 11. A tool that encrypts internet traffic and hides a user’s IP address.
  8. 13. A flaw in software that is unknown to the vendor and, therefore, unpatched.
  9. 14. A network of infected devices controlled remotely by a hacker, typically to launch large-scale attacks.