Cybersecurity In December

123456789101112131415
Across
  1. 4. 2 or more computers/devices connected together to share resources
  2. 8. The process of identifying a user's identity
  3. 9. Coding used to protect your information from unauthorized access
  4. 11. a form of malware that spies on you and your computer activities
  5. 13. acronym for Virtual Private Network
  6. 14. an update released to fix bugs and other vulnerabilities
  7. 15. Used to keep intruders out
Down
  1. 1. Software or device that has a flaw that can be exploited
  2. 2. software or hardware used to combat viruses
  3. 3. malware that looks legitimate, like the Greek horse
  4. 5. MALicious softWARE
  5. 6. a copy of data that is used in case of emergencies
  6. 7. Software that is used to encrypt a user's files then demand ransom
  7. 10. Trying to get sensitive information through social engineering
  8. 12. the act of using a vulnerability