Cyber Security Crossword
345 views
Cyberattack | Antivirus | Password | Spoofing | Patch | Bug | Phishing | Ransomware | Exploit | Firewall | Malware | Encryption |
- Email sent to users to try and gain credentials or private dataphishing
- Intrusive software intended to harm the users devicemalware
- Scrambling data using an algorithmencryption
- Malicious program designed to extort money from the victimransomware
- Virtual perimeter around a network to prevent viruses, hackers, etc.firewall
- Utilizing a flaw or vulnerability to gain access to devices or private dataexploit
- An attacker pretending to be an authorized user to gain access to a networkspoofing
- Virus detection program to protect users from harmful programsantivirus
- A vulnerability in a programs code that attackers might take advantage ofbug
- Attempt to break through security perimeters mainly done to acquire private infocyberattack
- Should be strong, not reused and not easily guessed or shared with anyonepassword
- System or program update to fix bugs or vulnerabilitiespatch
10 c | |||||||||||||||||
y | |||||||||||||||||
9 b | u | g | |||||||||||||||
12 p | e | ||||||||||||||||
11 p | a | s | s | w | o | r | d | ||||||||||
t | 2 m | a | l | w | a | 4 r | e | ||||||||||
c | 3 e | t | a | ||||||||||||||
1 p | h | i | s | h | i | n | g | t | n | ||||||||
c | a | s | |||||||||||||||
r | c | o | |||||||||||||||
y | k | m | |||||||||||||||
6 e | p | w | |||||||||||||||
x | t | a | |||||||||||||||
p | i | r | |||||||||||||||
l | o | 5 f | i | r | e | w | a | l | l | ||||||||
7 s | p | o | o | f | i | n | g | ||||||||||
8 a | n | t | i | v | i | r | u | s | |||||||||
t |