cyber citizen

12345678910111213141516171819202122
Across
  1. 2. The process of connecting systems, software, or services so they can share data and function together.
  2. 4. The process of transferring digital data (like files, software, images, videos) from a remote source, such as a server on the internet or another computer, to your local device (like your computer, phone, or tablet).
  3. 5. An update released by developers to fix security flaws, improve performance, or add new features.
  4. 7. SINGLE SIGN-ON
  5. 8. A set of standardized rules and procedures that govern how data is securely transmitted over a network.
  6. 12. A system upgrade provided by the software vendor to improve performance, fix bugs, and address security vulnerabilities.
  7. 14. The unauthorized release or exposure of sensitive or confidential information, often due to security vulnerabilities, human error, or breaches of third-party services.
  8. 16. Any individual, organization, or system whose data or access has been encrypted or locked by ransomware attackers, with a demand for payment to restore access.
  9. 19. A manipulation technique that exploits human error to gain access to confidential systems or data
  10. 21. Wi-Fi Protected Access II.
  11. 22. The primary password is used to access a password manager or secure system.
Down
  1. 1. Issued by a trusted Certificate Authority (CA) and verifies that a website, device, or user is legitimate and secure.
  2. 3. A tool or software that creates random, complex passwords, typically combining letters, numbers, and special characters, to enhance security and reduce the risk of unauthorized access.
  3. 6. Individuals or groups who use hacking techniques to promote political, social, or environmental causes, often by disrupting services, exposing information, or protesting against governments, corporations, or social injustices.
  4. 9. A browser alert that appears when a website's digital certificate is expired, improperly configured, self-signed, or issued by an untrusted Certificate Authority (CA).
  5. 10. The process of isolating potentially malicious files or software in a secure area of your device or network.
  6. 11. Wi-Fi Protected Access.
  7. 13. Wi-Fi Protected Access III.
  8. 15. Wired equivalent privacy.
  9. 17. Any unauthorized hardware—such as a USB drive, wireless access point, or laptop—that is connected to a network or system without permission.
  10. 18. Also known as Business Email Compromise (BEC), a type of cybercrime where attackers impersonate an executive or other trusted figure within a company to deceive employees.
  11. 20. A structured approach to identifying, managing, and recovering from a cybersecurity threat or breach.