Security Crossword

1234567891011121314151617181920
Across
  1. 4. - Software that is specifically designed to disrupt, damage, or gain unauthorized access to computer systems.
  2. 6. - A vulnerability in software that is unknown to the vendor and can be exploited by hackers.
  3. 12. - A type of malicious software designed to block access to a computer system until a sum of money is paid.
  4. 14. - The process of converting an input (or 'message') into a fixed-length string of characters, which is typically a hash code.
  5. 16. - The process of verifying the identity of a user or process.
  6. 17. - A network of private computers infected with malicious software and controlled as a group.
  7. 18. - A method of trying to gather personal information using deceptive e-mails and websites.
  8. 20. - A type of malware that is often disguised as legitimate software.
Down
  1. 1. - A method of bypassing normal authentication to secure unauthorized remote access to a computer.
  2. 2. - A network security system that monitors and controls incoming and outgoing network traffic.
  3. 3. - A type of surveillance software that has the capability to record every keystroke you make.
  4. 5. - The process of converting information or data into a code to prevent unauthorized access.
  5. 7. - A collection of software tools that enable unauthorized access to a computer or network.
  6. 8. - Software that enables a user to obtain covert information about another's computer activities.
  7. 9. - Virtual Private Network, a service that encrypts your internet traffic and protects your online identity.
  8. 10. - A security mechanism for separating running programs to reduce system failures or software vulnerabilities.
  9. 11. - Distributed Denial of Service, an attack meant to shut down a machine or network, making it inaccessible.
  10. 13. - A piece of software designed to update or fix problems with a computer program or its supporting data.
  11. 15. - Software designed to detect and destroy computer viruses.
  12. 19. - Unauthorized access to a computer system or network.