Cybersecurity Crossword Puzzle

1234567891011121314151617181920
Across
  1. 1. Hackers engaging in illegal activities.
  2. 4. Fraudulent attempt to steal data.
  3. 5. Overloading systems by traffic flood.
  4. 8. Manipulating people for sensitive data.
  5. 10. Converting data into a secure format.
  6. 11. Malware that demands payment for release.
  7. 13. A weakness in system security.
  8. 14. Malicious software disguised as useful.
  9. 16. Advanced Wi-Fi security proticol.
  10. 18. Trying all possible combinations to crack passwords.
  11. 19. Unauthorized access to confidential data.
  12. 20. Malicious software designed for harm.
Down
  1. 2. Verifying user identity through credentials.
  2. 3. Maliciouse code that replicates and spreads.
  3. 6. Virtual Private Network for encrypted connections.
  4. 7. Ethical hackers who improve security.
  5. 9. Software that detects and removes malware.
  6. 12. Software that secretly gathers information.
  7. 15. Network security to monitor traffic.
  8. 17. Update fixing security flaws or bugs.