Cyber Security by Michaela Erica Arcenal
Across
- 1. The process of converting information into coded form
- 7. A physical or digital device used for authentication
- 8. Malware disguised as legitimate software to trick users
- 9. Identity verification using fingerprints or face recognition
- 10. Restricting who can view or use resources
- 11. Software designed to detect and remove viruses
- 12. A longer version of a password made of multiple words
- 14. When malicious software enters a system
- 19. Keeping information secret from unauthorized users
- 21. Simulated cyberattack to test system security
- 24. Software designed to damage, disrupt, or gain unauthorized access to a computer system
- 27. A secret word or phrase used to access a system
- 30. A cyberattack that tricks users into revealing personal information
- 34. Using multiple methods to verify identity
- 37. A method of blocking or allowing data based on rules
- 38. A person who gains unauthorized access to computer systems
- 39. The protection of personal information from misuse
Down
- 2. A security process that uses two methods to verify identity
- 3. Permission given to collect or use personal data
- 4. Safeguarding personal information from misuse
- 5. Information used to verify identity
- 6. The process of verifying a user’s identity
- 13. Malicious software that secretly collects user information
- 15. A security system that monitors and controls network traffic
- 16. Confirming the identity of a user
- 17. The act of entering credentials to access a system
- 18. A type of malware that spreads and infects systems
- 20. Protection of computer networks from intruders
- 21. A short numeric password
- 22. The science of securing information through codes
- 23. Malware that locks files and demands payment to restore access
- 25. Fake email messages designed to trick recipients
- 26. Pretending to be a trusted source to deceive users
- 28. A temporary code used for login verification
- 29. A person who commits crimes using computers
- 31. A fraudulent scheme to steal money or information
- 32. The process of converting coded text back to readable form
- 33. A method used to convert plain text into coded text
- 35. Malware that spreads without user action
- 36. A security expert who tests systems legally