Cybersecurity Awareness

12345678910111213141516171819202122232425
Across
  1. 3. A network of infected computers or devices that are controlled by attackers to perform malicious tasks.
  2. 5. Unauthorized access to or manipulation of computer systems or networks, often for malicious purposes.
  3. 7. A type of malware that locks a user’s files or system, demanding payment to restore access.
  4. 10. A fix or update to software that addresses security vulnerabilities or bugs.
  5. 11. Manager A tool that stores and manages your passwords securely, making it easier to use complex, unique passwords for different sites.
  6. 14. A type of software or hardware that secretly records keystrokes, often used to steal passwords and sensitive information.
  7. 15. Horse Malicious software disguised as a legitimate program to deceive users and gain access to their systems.
  8. 16. Response The process of detecting, responding to, and recovering from a cybersecurity breach or attack.
  9. 17. Engineering Manipulating people into giving up confidential information or performing actions that compromise security.
  10. 18. Software that secretly gathers information about you or your device without your consent.
  11. 20. (Distributed Denial of Service) An attack where multiple systems flood a server or network with traffic, overwhelming it and causing disruption.
  12. 22. A weakness or flaw in a system that can be exploited by attackers to gain unauthorized access.
  13. 24. The process of converting data into a secret code to prevent unauthorized access.
  14. 25. Security system that monitors and controls incoming and outgoing traffic to protect systems from unauthorized access.
Down
  1. 1. Software designed to detect, prevent, and remove malicious programs from your computer or network.
  2. 2. Authentication (2FA) A security method that requires two forms of identification to verify your identity, like a password and a text message code.
  3. 4. Any potential danger or risk that could exploit vulnerabilities in a system or network.
  4. 6. Malicious software designed to harm or exploit devices, systems, or networks.
  5. 8. Breach An incident where confidential data is accessed or disclosed without authorization.
  6. 9. Escalation A method used by attackers to gain higher levels of access or control within a system than originally allowed.
  7. 12. A security vulnerability that is unknown to the software maker and has no fix or patch available.
  8. 13. Detection System (IDS) A system that monitors network or system activity for signs of malicious activity or policy violations.
  9. 19. Scam where attackers try to trick individuals into revealing personal information by pretending to be trustworthy sources.
  10. 21. A copy of important data or files that can be restored in case of loss, damage, or attack.
  11. 23. (Virtual Private Network) A secure connection method that protects your internet activity by encrypting it and masking your location.