Cybersecurity terms

1234567891011121314151617
Across
  1. 3. - Malicious software designed to damage a system.
  2. 7. - A hidden method of bypassing security.
  3. 11. - Gathering personal information using deceptive emails.
  4. 13. - Coding used to protect information.
  5. 15. Address - Identifies the connection between a computer and the network provide
  6. 16. - Hardware that allows communication between a network and the Internet.
  7. 17. - A network of infected devices controlled by malware.
Down
  1. 1. - A security system that prevents intrusions.
  2. 2. - A system update that covers security vulnerabilities.
  3. 4. - A process that confirms a user’s identity.
  4. 5. - Someone who tries to gain unauthorized access.
  5. 6. - Distributed Denial of Service attack.
  6. 8. - Software that blocks access until money is paid.
  7. 9. - Virtual Private Network.
  8. 10. - Malware designed to remain hidden.
  9. 12. - A decoy system to attract attackers.
  10. 13. - Taking advantage of a computer’s vulnerability.
  11. 14. Breach - When information is stolen from a system.