Cyber Security 1

1234567891011121314
Across
  1. 4. Manipulative tactics used by cybercriminals to trick people into divulging sensitive information or performing actions that compromise security.
  2. 7. The part of the internet not indexed by search engines and accessible only through special software, often associated with illegal activities.
  3. 9. An incident in which unauthorized individuals gain access to sensitive, protected, or confidential data.
  4. 10. An additional layer of security that requires a user to provide two separate pieces of evidence for authentication.
  5. 11. The process of converting data into a code to prevent unauthorized access.
  6. 12. A trial-and-error method used by attackers to gain access to an account or system by systematically guessing passwords or encryption keys.
  7. 14. A string of characters used to authenticate a user's identity and grant access to a computer system or account.
Down
  1. 1. Malicious software designed to infiltrate or damage computer systems, networks, or devices.
  2. 2. A virtual private network that extends a private network across a public network, allowing users to send and receive data securely and anonymously.
  3. 3. A type of malicious software that encrypts a victim's files and demands payment for their release.
  4. 5. The practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.
  5. 6. A piece of information used to decrypt or encrypt data, ensuring its confidentiality and integrity.
  6. 8. A network of compromised computers remotely controlled by a cybercriminal to perform tasks such as launching attacks or sending spam emails.
  7. 13. A security system that controls incoming and outgoing network traffic based on predetermined rules.
  8. 14. A cyber attack that attempts to trick individuals into revealing sensitive information by posing as a trustworthy entity.