Cybersecurity Crossword

12345678910111213141516171819
Across
  1. 1. Requiring more than one form of verification. ____________ authentication
  2. 9. A network security system that monitors and controls traffic.
  3. 11. The process of verifying identity before granting access.
  4. 12. The process of converting data into a secure code.
  5. 16. A secret string of characters used for authentication.
  6. 19. The practice of protecting systems, networks, and programs from attacks.
Down
  1. 2. Technology simulating human intelligence, used in modern cybersecurity.
  2. 3. Malicious software disguised as legitimate software.
  3. 4. Malware that locks files and demands payment.
  4. 5. A scam using fake emails or messages to trick people into revealing information.
  5. 6. A clickable reference to another webpage or document.
  6. 7. Phishing conducted through SMS text messages
  7. 8. Software designed to harm or exploit systems.
  8. 10. A type of malware that replicates itself by infecting other programs.
  9. 11. Software that detects and removes malicious programs.
  10. 13. A well-known security awareness training platform.
  11. 14. A secure tunnel for internet traffic, stands for Virtual Private Network.
  12. 15. An attempt to damage, steal, or disrupt digital systems.
  13. 17. Manipulating people into revealing confidential information. ________ engineering
  14. 18. A hidden method of bypassing normal authentication.