Cybersecurity Month

123456789101112131415161718192021222324
Across
  1. 5. creating a fake identity on a social network account or dating website
  2. 7. an error, flaw, failure, or fault in a computer or system
  3. 8. programs that automatically execute tasks as ordered by the creator of the program that has infected them
  4. 10. after these are downloaded, opened, or executed, your data becomes corrupt
  5. 11. programs and other operating systems used by a computer
  6. 12. a type of malicious software that disguises itself as a harmless program
  7. 13. a cyber attacker
  8. 15. private network VPN
  9. 16. an attack when a person or program disguises themselves as another
  10. 19. malware used to gain access to a user's system or data
  11. 20. authentication attaching a phone number or email to an account for extra security
  12. 21. short for malicious software
  13. 22. breach when sensitive, protected, or confidential information is intentionally released to an untrusted environment
  14. 24. engineering taking advantage of human trust to gain access to private information
Down
  1. 1. customizable additions to software for extra functionality
  2. 2. secret word or phrase used to gain access
  3. 3. method of obtaining user info through fraudulent communications targeted directly at people
  4. 4. a technique for protecting computers, networks, programs, and data from unauthorized access or hackers
  5. 6. the way in which the identity of a user is confirmed
  6. 8. cryptocurrency
  7. 9. software that automatically displays or downloads material when a user if offline
  8. 14. a form of malware used to threaten victims by blocking, publishing, or corrupting their data unless a ransom is paid
  9. 17. technology IT
  10. 18. an internet traffic filter meant to stop unauthorized traffic
  11. 23. the physical and tangible parts of a computer