Cyber Security Awareness Month

123456789101112131415161718192021222324252627282930313233
Across
  1. 2. A software that is designed to cause damage to a computer, server, or network.
  2. 5. A program that secretly tracks your online activity and collects personal information.
  3. 8. The act of stealing and using another person's personal information without their permission.
  4. 10. A type of malware that encrypts a victim's files and demands a ransom payment to restore access.
  5. 11. Using social media to gather personal information about a target to gain their trust.
  6. 12. A type of denial-of-service attack that floods a server with a massive amount of traffic, making it unavailable to users.
  7. 14. A digital signature that verifies the identity of a website or user.
  8. 16. A code that restricts access to your phone or computer.
  9. 17. The "lock" icon you see in your browser when a website is secure, ensuring a private connection.
  10. 18. A person who breaks into computer systems, often for illegal purposes.
  11. 21. A person who uses hacking to promote a political or social cause.
  12. 24. course! Here are the clues and answers in the format you requested, with the answer first, followed by a space, and then the clue.
  13. 26. The use of a fake email address to trick a recipient into believing the email is from a different sender.
  14. 28. Clues
  15. 29. A service that encrypts your internet traffic and hides your IP address, protecting your online privacy.
  16. 30. me know if you would like me to create more clues or if you need the puzzle in a different format!
  17. 31. A type of malicious software that tricks users into downloading or buying fake antivirus software by displaying fake warnings.
  18. 33. A set of rules and procedures for communicating data between computer systems.
Down
  1. 1. A type of malware that secretly records your keystrokes to steal your login credentials and other sensitive information.
  2. 3. Clues
  3. 4. The practice of protecting your data and systems from digital attacks.
  4. 6. A secret word or phrase used to prove your identity to gain access to a computer or other account.
  5. 7. A network that is not secure and can be accessed by anyone, making it a target for hackers.
  6. 9. The process of converting plain text into an unreadable code to prevent unauthorized access.
  7. 13. A type of malicious software that can replicate itself and spread to other computers.
  8. 14. A deceptive link that tricks you into clicking it, often leading to a malicious website or download.
  9. 15. Clues
  10. 17. A fake website designed to deceive you and steal your information.
  11. 19. A type of scam where a criminal pretends to be a legitimate person or organization to steal personal information.
  12. 20. A security vulnerability that is exploited by attackers before a patch or fix is available.
  13. 22. What you should do with your password on a regular basis.
  14. 23. An intrusion prevention system that monitors a network for malicious activity and takes action to block it.
  15. 25. An authentication method that requires two or more forms of verification to gain access to a resource.
  16. 27. A network security system that monitors and controls incoming and outgoing network traffic.
  17. 32. A type of malware that gives an attacker full administrative control over a system, often without the user's knowledge.