Cybersecurity
Across
- 3. Software that secretly collects information about you
- 6. A scam using fake emails to steal personal information
- 7. Installing the latest software fixes and security patches
- 9. A system that blocks unauthorized access to a network
- 10. Manipulating people into revealing confidential information
- 12. An added layer of security requiring a code or device confirmation
- 13. The process of verifying a user’s identity
- 14. A tool used to securely store and create strong passwords
- 15. The process of converting data into code to prevent access
Down
- 1. When unauthorized access to data occurs
- 2. A copy of important data stored separately for safety
- 4. A secret word or phrase used to access an account
- 5. A tool that hides your IP address and encrypts your internet traffic
- 8. Software that detects and removes malicious programs
- 11. Software designed to damage or disrupt systems