Cybersecurity Crossword Puzzle

1234567891011121314151617181920212223242526
Across
  1. 1. Network of hijacked computers
  2. 2. Manipulating people for access
  3. 3. Physically isolates a system
  4. 7. Vulnerability with no fix yet
  5. 8. Isolates programs for security
  6. 9. Adds extra login security
  7. 11. Impersonates a trusted source
  8. 12. Blocks unauthorized network access
  9. 14. Fixes security vulnerabilities
  10. 16. Self-replicates across networks
  11. 19. Steals active user session
  12. 20. Takes advantage of a weakness
  13. 22. Disguised malware for attacks
  14. 24. Malicious software harming devices
  15. 26. Tricks users into clicking links
Down
  1. 1. Hidden entry for unauthorized access
  2. 2. Secretly monitors user activity
  3. 4. Secures internet connection
  4. 5. Tries all password combinations
  5. 6. Converts data into fixed string
  6. 10. Unwanted or junk emails
  7. 11. Attacks databases with queries
  8. 13. Records keystrokes for theft
  9. 15. Displays unwanted advertisements
  10. 17. Encrypts files for payment
  11. 18. Overwhelms a server with traffic
  12. 20. Secures data using codes
  13. 21. Fraudulent attempt to steal data
  14. 23. Hidden part of the internet
  15. 25. Hides malware in a system