Cyber Security by Michaela Erica Arcenal

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 1. The process of converting information into coded form
  2. 7. A physical or digital device used for authentication
  3. 8. Malware disguised as legitimate software to trick users
  4. 9. Identity verification using fingerprints or face recognition
  5. 10. Restricting who can view or use resources
  6. 11. Software designed to detect and remove viruses
  7. 12. A longer version of a password made of multiple words
  8. 14. When malicious software enters a system
  9. 19. Keeping information secret from unauthorized users
  10. 21. Simulated cyberattack to test system security
  11. 24. Software designed to damage, disrupt, or gain unauthorized access to a computer system
  12. 27. A secret word or phrase used to access a system
  13. 30. A cyberattack that tricks users into revealing personal information
  14. 34. Using multiple methods to verify identity
  15. 37. A method of blocking or allowing data based on rules
  16. 38. A person who gains unauthorized access to computer systems
  17. 39. The protection of personal information from misuse
Down
  1. 2. A security process that uses two methods to verify identity
  2. 3. Permission given to collect or use personal data
  3. 4. Safeguarding personal information from misuse
  4. 5. Information used to verify identity
  5. 6. The process of verifying a user’s identity
  6. 13. Malicious software that secretly collects user information
  7. 15. A security system that monitors and controls network traffic
  8. 16. Confirming the identity of a user
  9. 17. The act of entering credentials to access a system
  10. 18. A type of malware that spreads and infects systems
  11. 20. Protection of computer networks from intruders
  12. 21. A short numeric password
  13. 22. The science of securing information through codes
  14. 23. Malware that locks files and demands payment to restore access
  15. 25. Fake email messages designed to trick recipients
  16. 26. Pretending to be a trusted source to deceive users
  17. 28. A temporary code used for login verification
  18. 29. A person who commits crimes using computers
  19. 31. A fraudulent scheme to steal money or information
  20. 32. The process of converting coded text back to readable form
  21. 33. A method used to convert plain text into coded text
  22. 35. Malware that spreads without user action
  23. 36. A security expert who tests systems legally