M3

123456789101112131415161718192021
Across
  1. 3. Physical or virtual barrier that controls network traffic
  2. 5. Process of verifying a user's identity
  3. 9. Security weakness in a system
  4. 10. A malicious program that replicates itself and spreads to other computers
  5. 13. Required information to solve a problem
  6. 14. Process of gathering necessary information about a problem
  7. 16. Unwanted bulk messages
  8. 19. Steps taken to prevent attacks
  9. 20. Testing a solution's effectiveness
  10. 21. Device for accessing computer networks
Down
  1. 1. Community-wide computer network
  2. 2. Malicious software
  3. 4. To find and fix problems
  4. 6. Physical components of a computer system
  5. 7. Final step in problem-solving process
  6. 8. The practice of protecting systems, networks, and programs from digital attacks
  7. 11. Make data unreadable to unauthorized users
  8. 12. A type of social engineering attack using fake emails
  9. 15. Tools used to detect and remove malware
  10. 17. Security copy of data
  11. 18. A common first step in problem-solving