Cybersecurity Awareness Month
Across
- 3. Keeping your software and systems current with the latest fixes
- 6. A person who uses computers to gain unauthorized access to data
- 8. A copy of data stored separately in case the original is lost or damaged
- 9. A program that replicates itself and spreads to other computers
- 13. Manipulating people into giving up confidential information
- 14. A username and password used to verify identity
- 16. A deceptive email or message that tricks you into giving information
- 19. A type of malware that locks your files and demands payment to unlock them
Down
- 1. The action you do to potential phishing attempts
- 2. A Device or software that blocks unauthorized access to a network
- 4. The process of converting data into a code to prevent unauthorized access
- 5. A type of software designed to detect and remove malicious programs
- 7. a dishonest scheme used to trick people into giving up information or money
- 10. A state where systems and data are protected from threats
- 11. A method of confirming your identity using two or more factors
- 12. An incident where data is accessed without authorization
- 15. Pretending to be someone else to gain access
- 17. Software that secretly gathers information about a person or organization
- 18. A secret word or phrase used to gain access to a system
- 20. A general term for software designed to harm or exploit systems