11 Digital Security

1234567891011121314151617181920212223242526272829303132333435
Across
  1. 3. A hidden way to bypass security measures
  2. 6. The trail of data left by online activity
  3. 7. A large-scale attack using multiple compromised devices to disrupt a service
  4. 10. A tool that encrypts internet traffic and hides the user’s IP address
  5. 12. A program that spreads by inserting copies of itself into other files
  6. 14. Harassment or bullying that occurs online
  7. 15. Configurations that specify which network traffic is allowed or blocked
  8. 19. Any illegal act involving the use of a computer or related devices
  9. 21. A tool that stores and generates secure passwords
  10. 24. A process of verifying the identity of a user or device
  11. 25. A legal doctrine allowing limited use of copyrighted material
  12. 31. A cyberattack targeting computer networks
  13. 32. Software used to detect and remove malware
  14. 33. A self-replicating program that spreads through networks
  15. 34. An attack that overloads a server to make it unavailable
  16. 35. Manipulating people into revealing confidential information
Down
  1. 1. Unauthorized access to a computer system or network
  2. 2. A group of compromised computers controlled by a hacker
  3. 4. An event that could cause loss or damage to computer hardware, software, or data
  4. 5. A plan to restore data and systems after a failure
  5. 8. How a person presents themselves online
  6. 9. A potential security risk due to lack of encryption
  7. 11. The process of converting data into a code to prevent unauthorized access
  8. 13. An update that fixes security vulnerabilities in software
  9. 16. A backup power device that provides electricity during an outage
  10. 17. A licensing system that allows content sharing with conditions
  11. 18. A type of malware disguised as a legitimate program
  12. 20. The rules of conduct for interacting online
  13. 22. Malicious software designed to harm or exploit any computing device
  14. 23. A device that protects electronics from power surges
  15. 26. A technique used to trick users into revealing personal information
  16. 27. An authentication method that requires two forms of verification
  17. 28. A type of malware that locks files and demands payment to unlock them
  18. 29. Software that secretly collects user information without consent
  19. 30. A security system that controls incoming and outgoing network traffic