Across
- 3. Digital proof of identity used in secure communications (9 letters)
- 6. A program that pretends to be legitimate but is malicious (5 letters)
- 7. An attack that overwhelms a system with traffic (3 letters)
- 10. Opposite of encryption (11 letters)
- 11. The process of converting data into unreadable form (10 letters)
- 12. Software that spreads copies of itself across networks (5 letters)
- 16. Ensuring data is not altered during storage or transfer (7 letters)
- 17. Harmful software designed to damage systems (6 letters)
- 18. Short form of "Personally Identifiable Information" (3 letters)
- 19. Unauthorized access to a computer system (5 letters)
Down
- 1. The process of verifying user identity (14 letters)
- 2. Practice of disguising data to protect privacy (7 letters)
- 4. Malicious software that locks files and demands payment (10 letters)
- 5. Secret word or phrase used for authentication (8 letters)
- 8. Unintended weakness in software that can be exploited (12 letters)
- 9. A person who breaks into systems legally to find vulnerabilities (9 letters)
- 10. Stronger form of DoS using multiple computers (4 letters)
- 13. Attempt to trick users into revealing sensitive information via fake emails (7 letters)
- 14. Security barrier between internal network and outside world (8 letters)
- 15. Secret numeric code used in two-factor authentication (3 letters)
