11 Digital Security
Across
- 3. A hidden way to bypass security measures
- 6. The trail of data left by online activity
- 7. A large-scale attack using multiple compromised devices to disrupt a service
- 10. A tool that encrypts internet traffic and hides the user’s IP address
- 12. A program that spreads by inserting copies of itself into other files
- 14. Harassment or bullying that occurs online
- 15. Configurations that specify which network traffic is allowed or blocked
- 19. Any illegal act involving the use of a computer or related devices
- 21. A tool that stores and generates secure passwords
- 24. A process of verifying the identity of a user or device
- 25. A legal doctrine allowing limited use of copyrighted material
- 31. A cyberattack targeting computer networks
- 32. Software used to detect and remove malware
- 33. A self-replicating program that spreads through networks
- 34. An attack that overloads a server to make it unavailable
- 35. Manipulating people into revealing confidential information
Down
- 1. Unauthorized access to a computer system or network
- 2. A group of compromised computers controlled by a hacker
- 4. An event that could cause loss or damage to computer hardware, software, or data
- 5. A plan to restore data and systems after a failure
- 8. How a person presents themselves online
- 9. A potential security risk due to lack of encryption
- 11. The process of converting data into a code to prevent unauthorized access
- 13. An update that fixes security vulnerabilities in software
- 16. A backup power device that provides electricity during an outage
- 17. A licensing system that allows content sharing with conditions
- 18. A type of malware disguised as a legitimate program
- 20. The rules of conduct for interacting online
- 22. Malicious software designed to harm or exploit any computing device
- 23. A device that protects electronics from power surges
- 26. A technique used to trick users into revealing personal information
- 27. An authentication method that requires two forms of verification
- 28. A type of malware that locks files and demands payment to unlock them
- 29. Software that secretly collects user information without consent
- 30. A security system that controls incoming and outgoing network traffic