Guardians of the Gateway: A Cybersecurity Puzzle
Across
- 4. A digital band-aid for fixing known security holes
- 5. It scrambles your data so only the right key can make sense of it
- 6. Like the wooden horse in Troy — looks harmless, but hides something dangerous inside
- 9. Your files are locked, and the price to unlock them isn’t cheap
- 10. Software with bad intentions — often hidden in innocent-looking files
Down
- 1. Like the Impostor in Among Us — pretending to be someone else to cause trouble
- 2. Before access is granted, this process asks: “Are you really who you claim to be?
- 3. Like James Bond — secretly watching, gathering intel without you knowing
- 4. A baited email hoping you’ll bite — and give away your credentials
- 7. A secret way into a system — often left open by accident or design
- 8. Like Jurassic Park — “The fences are down!” and now the threats are loose