Cyber Threats and Security

12345678910111213
Across
  1. 1. Capturing data while it is being transmitted over a network.
  2. 3. Overloading a server with excessive traffic to disrupt service.
  3. 5. Redirecting users to fake websites to steal personal data.
  4. 6. Deceptive attack tricking users into revealing sensitive information.
  5. 8. Security method using physical traits like fingerprints or facial recognition.
  6. 9. Restricting system access based on user roles.
  7. 12. Extra security layer requiring two authentication factors.
  8. 13. Software that detects and removes malicious programs.
Down
  1. 2. Malware disguised as legitimate software to trick users.
  2. 4. An intermediary server between users and websites for security and privacy.
  3. 5. Secret string of characters used for authentication.
  4. 7. System that filters and blocks unauthorized network traffic.
  5. 8. Repeatedly guessing passwords to gain unauthorized access.
  6. 10. Malware that secretly collects user information without consent.
  7. 11. Manipulating people into giving away confidential information.