Encrypting the You Matter Most Cybersecurity Crossword Challenge!

1234567891011121314151617
Across
  1. 3. A method of hiding sensitive data within seemingly harmless files or messages (HARD!!!)
  2. 4. A type of cyberattack that involves gaining access to a system and encrypting its data, then demanding payment for decryption.
  3. 9. The practice of tricking individuals into divulging sensitive information such as passwords or credit card numbers vi e-mail
  4. 10. _____-force attack is a technique used to guess a password by trying many possible combinations
  5. 11. Gain access to someone else’s computer or device without permission
  6. 12. The program you use to access the Internet (such as Chrome, Safari, Firefox, Edge)
  7. 13. Man-In-The-________ attack is an type of attack that intercepts and alters communication between two parties
  8. 14. An attack that floods a system with excessive network traffic, causing it to slow down or become unavailable is called a Denial of _______ attack
  9. 16. Two-Factor ______________ is a security measure that verifies a user's identity based on something they have, such as a security token
  10. 17. A location on the internet where you can save your data (rather than on your computer or device)
Down
  1. 1. A program or device used to detect and prevent unauthorized access to a network
  2. 2. A sequence of characters (or words) used to stop criminals from accessing your accounts
  3. 5. A method of protecting data by converting it into unreadable code that only authorized parties can read
  4. 6. Malicious software that could harm your computer or gadget
  5. 7. What is a form of malware that monitors and records a user's activities without their knowledge?
  6. 8. A simulated cyberattack on a computer system to identify vulnerabilities that could be exploited is called a ___________ test (Hard)
  7. 12. A security incident where sensitive information is leaked to the public is a data ______
  8. 15. ____-Day Vulnerabilities are software vulnerabilities that are unknown to the software vendor