Cyber Security Awareness Month
Across
- 2. A software that is designed to cause damage to a computer, server, or network.
- 5. A program that secretly tracks your online activity and collects personal information.
- 8. The act of stealing and using another person's personal information without their permission.
- 10. A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
- 11. Using social media to gather personal information about a target to gain their trust.
- 12. A type of denial-of-service attack that floods a server with a massive amount of traffic, making it unavailable to users.
- 14. A digital signature that verifies the identity of a website or user.
- 16. A code that restricts access to your phone or computer.
- 17. The "lock" icon you see in your browser when a website is secure, ensuring a private connection.
- 18. A person who breaks into computer systems, often for illegal purposes.
- 21. A person who uses hacking to promote a political or social cause.
- 24. course! Here are the clues and answers in the format you requested, with the answer first, followed by a space, and then the clue.
- 26. The use of a fake email address to trick a recipient into believing the email is from a different sender.
- 28. Clues
- 29. A service that encrypts your internet traffic and hides your IP address, protecting your online privacy.
- 30. me know if you would like me to create more clues or if you need the puzzle in a different format!
- 31. A type of malicious software that tricks users into downloading or buying fake antivirus software by displaying fake warnings.
- 33. A set of rules and procedures for communicating data between computer systems.
Down
- 1. A type of malware that secretly records your keystrokes to steal your login credentials and other sensitive information.
- 3. Clues
- 4. The practice of protecting your data and systems from digital attacks.
- 6. A secret word or phrase used to prove your identity to gain access to a computer or other account.
- 7. A network that is not secure and can be accessed by anyone, making it a target for hackers.
- 9. The process of converting plain text into an unreadable code to prevent unauthorized access.
- 13. A type of malicious software that can replicate itself and spread to other computers.
- 14. A deceptive link that tricks you into clicking it, often leading to a malicious website or download.
- 15. Clues
- 17. A fake website designed to deceive you and steal your information.
- 19. A type of scam where a criminal pretends to be a legitimate person or organization to steal personal information.
- 20. A security vulnerability that is exploited by attackers before a patch or fix is available.
- 22. What you should do with your password on a regular basis.
- 23. An intrusion prevention system that monitors a network for malicious activity and takes action to block it.
- 25. An authentication method that requires two or more forms of verification to gain access to a resource.
- 27. A network security system that monitors and controls incoming and outgoing network traffic.
- 32. A type of malware that gives an attacker full administrative control over a system, often without the user's knowledge.