Cybersecurity Terms

12345678910111213141516171819
Across
  1. 3. Secure network connection
  2. 4. Harmful software
  3. 7. Unique human identifiers
  4. 9. Wireless network connection
  5. 13. Secure Socket Layer
  6. 15. Software update fix
  7. 18. Keystroke monitoring software
  8. 19. Data recovery copy
Down
  1. 1. Malicious data encryption
  2. 2. Network of compromised devices
  3. 3. Malicious software
  4. 5. Denial of Service attack
  5. 6. Engineering Manipulating users for access
  6. 8. Malicious software disguised
  7. 10. Intrusion Detection System
  8. 11. Secure data encoding
  9. 12. Deceptive email attacks
  10. 14. Unsolicited email messages
  11. 16. Unauthorized access seeker
  12. 17. Network security barrier