Cybersecurity Week!

1234567891011
Across
  1. 2. Software used to prevent, scan, detect and delete viruses from a computer.
  2. 5. A type of cyber attack that exploits a vulnerability in software that no one is aware of yet.
  3. 7. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
  4. 9. A type of malware designed to give hackers access to and control over a target device.
  5. 10. A cyber-attack that targets individuals through SMS or text messages.
  6. 11. Tools that can record every keystroke that you type into a computer or mobile keyboard.
Down
  1. 1. A type of malware that disguises itself as legitimate code or software.
  2. 3. Any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission.
  3. 4. Malware that can reproduce itself for the purposes of spreading itself to other computers in the network.
  4. 6. A technique through which a cybercriminal disguises themselves as a known or trusted source.
  5. 8. A network of compromised computers used to carry out cyberattacks on other systems.