Cybersecurity Awareness
Across
- 3. A network of infected computers or devices that are controlled by attackers to perform malicious tasks.
- 5. Unauthorized access to or manipulation of computer systems or networks, often for malicious purposes.
- 7. A type of malware that locks a user’s files or system, demanding payment to restore access.
- 10. A fix or update to software that addresses security vulnerabilities or bugs.
- 11. Manager A tool that stores and manages your passwords securely, making it easier to use complex, unique passwords for different sites.
- 14. A type of software or hardware that secretly records keystrokes, often used to steal passwords and sensitive information.
- 15. Horse Malicious software disguised as a legitimate program to deceive users and gain access to their systems.
- 16. Response The process of detecting, responding to, and recovering from a cybersecurity breach or attack.
- 17. Engineering Manipulating people into giving up confidential information or performing actions that compromise security.
- 18. Software that secretly gathers information about you or your device without your consent.
- 20. (Distributed Denial of Service) An attack where multiple systems flood a server or network with traffic, overwhelming it and causing disruption.
- 22. A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access.
- 24. The process of converting data into a secret code to prevent unauthorized access.
- 25. Security system that monitors and controls incoming and outgoing traffic to protect systems from unauthorized access.
Down
- 1. Software designed to detect, prevent, and remove malicious programs from your computer or network.
- 2. Authentication (2FA) A security method that requires two forms of identification to verify your identity, like a password and a text message code.
- 4. Any potential danger or risk that could exploit vulnerabilities in a system or network.
- 6. Malicious software designed to harm or exploit devices, systems, or networks.
- 8. Breach An incident where confidential data is accessed or disclosed without authorization.
- 9. Escalation A method used by attackers to gain higher levels of access or control within a system than originally allowed.
- 12. A security vulnerability that is unknown to the software maker and has no fix or patch available.
- 13. Detection System (IDS) A system that monitors network or system activity for signs of malicious activity or policy violations.
- 19. Scam where attackers try to trick individuals into revealing personal information by pretending to be trustworthy sources.
- 21. A copy of important data or files that can be restored in case of loss, damage, or attack.
- 23. (Virtual Private Network) A secure connection method that protects your internet activity by encrypting it and masking your location.