Cyber Security Crossword

479 views

  1. Email sent to users to try and gain credentials or private data
  2. Intrusive software intended to harm the user's device
  3. Scrambling data using an algorithm
  4. Malicious program designed to extort money from the victim
  5. Virtual perimeter around a network to prevent viruses, hackers, etc.
  6. Taking advantage of a vulnerability or flaw
  7. Attacker pretending to bee an authorized user trying to gain access to a system
  8. Virus detection program to protect users from harmful programs
  9. A vulnerability in a program's code that attackers might take advantage of
  10. Attempt to break through security perimeters mainly done to acquire private info
1
p
2
m
h
4
r
a
n
s
o
m
w
a
r
e
i
3
6
e
x
p
l
o
i
t
7
s
p
o
o
f
i
n
g
w
h
c
a
10
c
i
r
r
y
n
y
e
b
9
b
u
g
p
e
8
a
n
t
i
v
i
r
u
s
a
t
t
5
f
i
r
e
w
a
l
l
c
k