Cybersecurity Awareness Month
Across
- 4. A fence provides this
- 8. From white to red
- 11. Virtual storage in the sky
- 12. Malicious software holding data hostage
- 15. Digital mischief-maker
- 18. Verifying Identity
- 20. Artificial or Real?
- 21. Identity verification through unique traits Yellow Data
Down
- 1. Digital bouncer for unauthorized data
- 2. AI-generated deception
- 3. Deceptive online lure
- 5. Computer ninja with a keyboard
- 6. Personal secret sentence for entry
- 7. Your computer is under the weather
- 9. Security theft exposing data
- 10. Cyber vigilance
- 13. Wireless internet access point
- 14. Voice trickery that sounds fishy!
- 16. BIG catch for cyber criminals
- 17. Security in scrambled letters
- 19. Interconnected web of computers