Cybersecurity terms

1234567891011121314151617181920
Across
  1. 4. horse Malicious software disguised innocuously.
  2. 6. Identity verification using traits.
  3. 11. Malicious software threat
  4. 14. Malicious code component.
  5. 15. security Device-specific protection measures.
  6. 17. policy Guidelines for security measures.
  7. 19. Applying software updates regularly.
  8. 20. Weakness in system security.
Down
  1. 1. Deceptive email communication.
  2. 2. testing Ethical hacking simulation.
  3. 3. Malware with system-level access.
  4. 5. hygiene Good digital security practices.
  5. 7. incident Breach or violation event.
  6. 8. Identity verification using traits.
  7. 9. Malicious digital intrusion attempt.
  8. 10. Network security barrier.
  9. 12. Data protection through scrambling.
  10. 13. Secure communication technique.
  11. 16. Software against malicious programs.
  12. 18. hat Ethical security expert.