Share Focus Mode

Cybersecurity Crossword

12345678910111213141516171819202122232425
Across
  1. 2. Pretending to be somebody else online.
  2. 5. A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program
  3. 8. A type of attack that uses trial and error over and over to guess a password until it is correct.
  4. 9. Small files that are saved on your computer that store information that help websites track your visits
  5. 10. A virus that can replicate without the user doing anything such as opening a program.
  6. 13. Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
  7. 15. Stealing another person's information to use for criminal activity.
  8. 19. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
  9. 20. A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands money if the victim wants his or her files back.
  10. 21. The amount of data that can pass through a network or part of a network per second.
  11. 22. Computer programs that can block, detect, and remove viruses and other malware.
  12. 23. Creating a web address that purposely fools people into thinking it is another person or company's website.
  13. 24. The process of making extra copies of computer files that can be used to restore files that are lost or damaged.
  14. 25. Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Down
  1. 1. The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
  2. 3. Two or more interconnected devices that can exchange data.
  3. 4. A "good guy" hacker; one who hacks to help find vulnerabilities to make a system more secure.
  4. 6. Software designed to block malware from entering protected networks.
  5. 7. The use of something in a way different from what it was intended for in order to solve a problem.
  6. 11. A general name for software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
  7. 12. A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
  8. 14. Malware that records every key struck on a keyboard and sends that information to an attacker.
  9. 16. A way of shutting down or slowing down a website by overwhelming it with a flood of traffic from a team of computers.
  10. 17. Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
  11. 18. A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.