You are on page 1of 2

Cyber Security Puzzle

1
H a 2C k e r
a
p 3
B
t i
4
R i 5S k c o
P6
p h 7
M a l w a r e
8
R a n s o m 9W a r e
t o o t
c f r r S 10

h m V i r u
11
s m
D 12
c i
T r o j a
13
n H 14O r s e s
o r p R
15
W h a l i n g
16

o k e e i
t w E n c r y p
17
t i o n
h e m o g
b b a r
r i t
u F l a w
18
F i
19
r e w a l l
s t
h

Across Down
1. Unauthorized user with malicious intent 2. Device used to identify a human person entering data
4. The potential for losing valuable information 3. Human characteristics used for identification
7. A software program that enters a computer system without the 5. To pose or pretend to be another person in email
owner's knowledge or consent
6. A routine fix for a computer program
8. A criminal tool used for extortion
9. A self-replicating malicious program
11. A sickness in your system
10. When a criminal uses text messages to trick you
13. A program that hides functions that are potentially malicious
12. Vast underbelly of the internet
16. Phishing for the big prize!
13. Your password is like a ___, use it regularly, change it often and do
17. Process of protecting data by secret code not share it with anyone else
18. A small computer defect 14. Don't ___ any file you weren't expecting to receive
19. A system that prevents unauthorized access 15. What you should do if you see any anomaly
17. No reputable organization is going to ask you for private information
via

You might also like