Name: _______________________
Across
- 4. An attempt by hackers to damage or gain unauthorized access to your computer or network.
- 6. The process of proving who you are, like using a password or fingerprint.
- 7. A program you use to access the internet (like Chrome or Safari).
- 12. A copy of important data stored separately to protect against data loss.
- 15. Software that helps protect your computer from viruses by detecting and removing them.
- 16. _________ AUTHENTICATION - A security process that requires two or more forms of identification to access data.
- 18. (2 words) A tool that helps you create and store strong passwords securely.
- 20. (2 words)When sensitive information is accessed without permission.
Down
- 1. The practice of protecting computers, networks, and data from unauthorized access or attacks.
- 2. (2 words)When someone steals your personal information to commit fraud.
- 3. (2 words)Tricks used by hackers to manipulate people into giving away confidential information.
- 5. : The method of converting information into a code to prevent unauthorized access.
- 8. Malware that locks your files and demands payment to unlock them.
- 9. : A scam where attackers send fake emails to trick you into providing personal information.
- 10. : Someone who tries to gain unauthorized access to computers or networks.
- 11. Malicious software designed to harm or exploit computers.
- 13. Small data files stored on your computer by websites to remember your preferences.
- 14. : A secret word or phrase used to access a computer or service.
- 17. : A security system that controls incoming and outgoing network traffic.
- 19. : Unwanted or junk email.