Cybersecurity Terminology

1234567891011121314151617181920
Across
  1. 5. malicious software executed by trigger
  2. 7. nefariously spreads via email attachments
  3. 9. stores and manages credentials
  4. 11. spreads computer to computer
  5. 12. malicious encryption demanding payment
  6. 13. designed to exploit macros
  7. 16. disguised program intending to steal
  8. 17. finds weaknesses to exploit systems
  9. 20. stored small text files
Down
  1. 1. targeting systems to overwhelm
  2. 2. secretly recording private device activity
  3. 3. new phone using stolen data
  4. 4. Targeted advertisements from online activity
  5. 6. Attack Botnet used to target website
  6. 8. Private Network within Public Network
  7. 10. personalized attacks luring victims
  8. 14. mass stolen credentials gaining access
  9. 15. layered disguise for unintended clicking
  10. 18. remotely controlled devices launching attacks
  11. 19. monitors and controls network traffic