Security puzzle

123456789101112131415161718192021
Across
  1. 4. A security technique that adds an extra step and requires users to enter more information than just a password (abbreviation)
  2. 5. A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously
  3. 9. The process of taking plain text and scrambling it into a code that is in an unreadable format
  4. 12. Sending unwanted bulk messages to a large number of recipients, often commercial in nature without consent of the recipients
  5. 14. A software designed to detect and destroy computer viruses
  6. 15. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication
  7. 16. Email sent trying to get user to click on a malicious link
  8. 17. Following someone through physical security without using your own badge
  9. 18. Harmful computer programs such as viruses, worm, and trojans used by hackers to gain access to your computer and cause destructions
  10. 20. Fraudulent text messages that try and get information (or youtube gift cards) from you
  11. 21. Malicious software that intends to block access to a computer or server until an amount of money is paid
Down
  1. 1. Copies of critical data should be maintained in the event of catastrophic system failure
  2. 2. A flaw or weakness in a computer system that can be exploited
  3. 3. Should be constructed of a long string of upper and lower case letters, numbers, and special characters, and not used more than one place
  4. 6. Social ______ is the name of the cybersecurity threat where nefarious actors trick others into revealing sensitive information.
  5. 7. Where to find our policies
  6. 8. The address of a webpage. Check that it is valid before clicking on it (abbreviation)
  7. 10. Information (typically electronic) that can identify a particularly individual, such as name, email, address (abbreviation)
  8. 11. Security tool that creates a secure, encrypted connection between you and the internet (abbreviation)
  9. 13. The process of verifying the identity of a user
  10. 19. An individual who uses technology to try and gain unauthorized access to systems/networks to commit crimes