Aquascape's Cyber Security Awareness Month Crossword Challenge

123456789101112
Across
  1. 2. A program that spreads to other devices by attaching itself to files or programs.
  2. 5. A digital barrier to keep unauthorized users out of a network or device.
  3. 7. A unique string of characters used to verify identity.
  4. 8. The practice of protecting data by converting it into unreadable code.
  5. 9. Software used to detect and prevent malware on a system.
  6. 10. A technique used to trick users into providing sensitive information.
  7. 11. A technique where criminals trick users into revealing personal data by pretending to be a trustworthy entity.
Down
  1. 1. An attack that floods a network or website, overwhelming its capacity.
  2. 2. Weak points that hackers exploit in software or hardware.
  3. 3. A method of verifying identity using two or more methods (e.g., password and token).
  4. 4. A harmful program that appears legitimate but performs malicious functions.
  5. 6. The act of gaining unauthorized access to a computer system.
  6. 12. The unauthorized copying, use, or distribution of software.