Crossword Puzzle For CS

123456789101112131415161718192021222324252627282930
Across
  1. 3. – A copy of data stored in case the original is lost or damaged.
  2. 5. – A list of trusted websites or emails that are safe to use.
  3. 8. – Malware that locks files and demands payment to unlock them.
  4. 9. – Installing the latest version of software to fix security issues.
  5. 12. – Unauthorized access to sensitive information.
  6. 13. – Unsolicited, often irrelevant emails or messages.
  7. 14. – Malicious software that attaches to programs to spread and damage files.
  8. 16. – A scam that tricks users into giving personal information.
  9. 19. – A hidden way for hackers to access a computer system.
  10. 20. – A network of infected computers controlled remotely by hackers.
  11. 22. – A type of malware that replicates itself to spread to other computers.
  12. 24. – A list of websites or emails that are considered unsafe or malicious.
  13. 25. – A system that protects your computer from unauthorized access.
  14. 26. – The process of encoding data to keep it safe from unauthorized access.
  15. 27. – Fake software that scares users into downloading it.
  16. 28. – Software that secretly records keystrokes to steal information.
  17. 29. – Another name for Trojan Horse; malicious software pretending to be useful.
  18. 30. – A software update that fixes bugs or security vulnerabilities.
Down
  1. 1. – Verifying the identity of a user or system before granting access.
  2. 2. – Software that secretly monitors and collects information from users.
  3. 4. – Software that scans and removes viruses from your computer.
  4. 6. – Malware disguised as legitimate software to trick users.
  5. 7. – Software that displays unwanted advertisements on your computer.
  6. 10. – A type of malware that hides the presence of other malicious software.
  7. 11. – Redirecting users to fake websites to steal information.
  8. 15. – A software used to detect and remove spyware.
  9. 17. – Trickery used to manipulate people into giving out confidential information.
  10. 18. – A security flaw that is exploited before the software is updated.
  11. 21. – Gaining unauthorized control of a computer or account.
  12. 23. – Software designed to harm your computer or steal data.