Cyber Security Awareness Month
Across
- 3. An attempt to gain unauthorized access to data or systems.
- 4. A device used to intercept and record network traffic.
- 5. Secret combination used to secure your online accounts.
- 7. A secret key generated from cryptographic processes for authentication.
- 8. Software that protects a computer from unauthorized access via the internet.
- 9. An attack that overloads a system to prevent legitimate access.
- 11. A cyber-attack where a user is tricked into giving sensitive information.
- 14. The process of verifying your identity before accessing an account.
- 15. This security practice hides data so only authorized parties can read it.
Down
- 1. The process of making a network secure from unauthorized access.
- 2. Type of malware that demands payment to release control of your device.
- 6. The act of guessing someone’s password by trying common words.
- 10. Unwanted or junk email often containing phishing links.
- 12. Network of infected computers controlled by an attacker.
- 13. An individual who uses their skills to protect networks.