CrosswordMint
Digital Defense and Intrusion Insights
Moderate difficulty suitable for most players
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Across
  • 1. Security system that monitors and controls network traffic
  • 3. Software that secretly gathers user information
  • 4. Network of infected devices controlled remotely
  • 5. Malicious software designed to damage or disrupt systems
  • 7. Hidden method of bypassing normal authentication
  • 8. Deceptive attempt to steal sensitive info via fake communication
  • 11. Technique that records keystrokes to capture data
  • 13. Payment demanded in exchange for releasing seized data
  • 17. Update to fix software vulnerabilities
Down
  • 2. Secret word or phrase used for authentication
  • 6. Attack that overwhelms a system to deny service
  • 9. Genuine process to verify user identity
  • 10. Decoy system to attract cyber attackers
  • 12. Malicious code disguised as legitimate software
  • 14. Process of converting data into unreadable code
  • 15. Small program that replicates and spreads to harm systems
  • 16. Intermediate server that masks user IP addresses
  • 18. Unsolicited and irrelevant messages sent in bulk

Similar Crossword Puzzles