Cybersecurity Terms

1234567891011
Across
  1. 2. The practice of securing systems, networks, and technologies from attacks and unauthorized access
  2. 7. A type of network security that filters incoming and outgoing traffic
  3. 9. When a legitimate website’s traffic is redirected to a fake site for malicious purposes
  4. 10. Disguising data so it’s impossible to decipher without authorization
Down
  1. 1. Using a device to mine cryptocurrency, without the device owner’s knowledge or permission
  2. 3. Sending emails with a forged sender address is called email...
  3. 4. Malicious software designed to disrupt a computer, server, or network
  4. 5. A chain of Internet-connected devices centrally controlled by a hacker
  5. 6. Email that you’ve technically solicited but it may serve little to no purpose to you
  6. 8. A tool that allows you to maintain online anonymity while using the Internet
  7. 11. DKIM and DMARC are both examples of a standard email authentication...